The probability that a specific vulnerability within an organization will be attacked by a threat is known as __________.

A. impact
B. likelihood
C. uncertainty
D. tolerance

Answer: B

Computer Science & Information Technology

You might also like to view...

An algorithm’s execution time is related to the number of ______ it requires.

a) parameters b) test data sets c) data fields d) operations

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The use of named constants makes an algorithm more flexible. 2. A detail line is usually written after the loop is exited. 3. A heading line serves as a title to a report that is output. 4. The priming read is usually placed as the first step within the loop. 5. The loop read in a loop controlled using trailer record logic is usually placed as the last step in the loop.

Computer Science & Information Technology