____ tools are frequently used to assist in the collection of risk measurement data because in most instances, risk management activities generate a lot of data.

A. Manual
B. Hybrid
C. Scanning
D. Automated

Answer: D

Computer Science & Information Technology

You might also like to view...

If your computer doesn't meet the minimum system requirements for a piece of software, it will probably still run on your system

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT a step you should take to prevent attackers from exploiting SQL security holes?

A. limit table access B. use stored procedures C. use standard naming conventions D. place the database server in a DMZ

Computer Science & Information Technology