One of the main jobs of computer security researchers is to try to design strategies to mitigate the risks that are identified in a ____ analysis.

A. concern
B. baseline
C. threat
D. foundational

Answer: C

Computer Science & Information Technology

You might also like to view...

Queries in Access can be exported as a web page

Indicate whether the statement is true or false

Computer Science & Information Technology

The Convert Text to Table feature can be accessed through a icon found on the:

A) Insert tab. B) Page Layout tab. C) Home tab. D) Review tab.

Computer Science & Information Technology