?In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.
A. ?proxy
B. ?risk
C. ?firewall
D. ?warning
Answer: B
Computer Science & Information Technology
You might also like to view...
When presenting to an audience, you should create handouts to have a printed version of your presentation to share with others
Indicate whether the statement is true or false
Computer Science & Information Technology
How many times should you press the Tab key to line up text?
What will be an ideal response?
Computer Science & Information Technology