The ____________________ control strategy attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.

Fill in the blank(s) with the appropriate word(s).

mitigation

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 7-3Jillian maintains a site that shows animations, movies, and sound clips made by the comedians that are part of her talk show, Jillian's Chatter. For audio recordings of her participants, the format to use to maintain high sound quality in the smallest file size would be ____.

A. swf B. flv C. mp3 D. wav

Computer Science & Information Technology

Which method of the Math object rounds a value to the next lowest integer??

A. ?ceil() B. ?floor() C. ?max() D. ?min()

Computer Science & Information Technology