?In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.

A. ?proxy
B. ?risk
C. ?firewall
D. ?warning

Answer: B

Computer Science & Information Technology

You might also like to view...

When presenting to an audience, you should create handouts to have a printed version of your presentation to share with others

Indicate whether the statement is true or false

Computer Science & Information Technology

How many times should you press the Tab key to line up text?

What will be an ideal response?

Computer Science & Information Technology