According to the textbook, three aspects must be taken into account to determine risk: the threat, the asset, and the ______.

A. sustainability
B. treatability
C. vulnerability
D. accessibility

Ans: C. vulnerability

Computer Science & Information Technology

You might also like to view...

A VPN is used as an internal communications system among help desk personnel

Indicate whether the statement is true or false

Computer Science & Information Technology

Which statement is false?

a) Function atof returns a double version of its argument. b) If the converted value cannot be represented, the behavior of atoi is undefined. c) When using functions from the general utilities library, its header file must be included. d) Function strtol receives three arguments.

Computer Science & Information Technology