____ tools are frequently used to assist in the collection of risk measurement data because in most instances, risk management activities generate a lot of data.
A. Manual
B. Hybrid
C. Scanning
D. Automated
Answer: D
Computer Science & Information Technology
You might also like to view...
If your computer doesn't meet the minimum system requirements for a piece of software, it will probably still run on your system
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?
A. limit table access B. use stored procedures C. use standard naming conventions D. place the database server in a DMZ
Computer Science & Information Technology