____ incidents include such things as pre-attack probes, unauthorized access attempts, or structural vulnerabilities.
A. Potential
B. Actual
C. Reference
D. Auditable
Answer: A
Computer Science & Information Technology
You might also like to view...
Because all data is stored in tables in Access, the data in Excel must be in a(n) ________ form
Fill in the blank(s) with correct word
Computer Science & Information Technology
For any eight-bit x, which of the following does not result in zero?
a) x &= (~x) b) x ^= x c) x <<= 8 d) x |= x
Computer Science & Information Technology