What is used to identify and communicate an attacker's perspective?

A. Design pattern
B. Attack pattern
C. Attack plan
D. Design plan

Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following operators are right-associative.

a. * b. + (binary +) c. % d. && e. =

Computer Science & Information Technology

A node that contains one data item and has two children is called a ______.

a) 1-node b) 2-node c) single node d) double node

Computer Science & Information Technology