According to the textbook, three aspects must be taken into account to determine risk: the threat, the asset, and the ______.
A. sustainability
B. treatability
C. vulnerability
D. accessibility
Ans: C. vulnerability
Computer Science & Information Technology
You might also like to view...
A VPN is used as an internal communications system among help desk personnel
Indicate whether the statement is true or false
Computer Science & Information Technology
Which statement is false?
a) Function atof returns a double version of its argument. b) If the converted value cannot be represented, the behavior of atoi is undefined. c) When using functions from the general utilities library, its header file must be included. d) Function strtol receives three arguments.
Computer Science & Information Technology