____ incidents include such things as pre-attack probes, unauthorized access attempts, or structural vulnerabilities.

A. Potential
B. Actual
C. Reference
D. Auditable

Answer: A

Computer Science & Information Technology

You might also like to view...

Because all data is stored in tables in Access, the data in Excel must be in a(n) ________ form

Fill in the blank(s) with correct word

Computer Science & Information Technology

For any eight-bit x, which of the following does not result in zero?

a) x &= (~x) b) x ^= x c) x <<= 8 d) x |= x

Computer Science & Information Technology