____ involves the management of vulnerabilities that are known to exist, but that have not yet led to a security incident.
A. Proactive change
B. Preventive change
C. Detective change
D. Restrictive change
Answer: B
Computer Science & Information Technology
You might also like to view...
Sending an email message is like having an open conversation in public-many people can listen to your messages, especially if they are not _____. ?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The Trace Outline command traces the outline of the stroke at its current stroke weight, then converts the stroke into a filled object with that size.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology