Multiple Choice
In computer security, a threat ____ is an attempt (usually in the form of a document or diagram) to systematically identify the ways that technology might be vulnerable to a malicious attack.
A) simulation
B) analysis
C) construction
D) encapsulation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: Match each term with the correct statement
Q3: Why is it important to remember to
Q4: Computer programs that make a job easier
Q5: Match each term with the correct statement
Q6: For whom is predictive typing useful?
Q7: The terms "vulnerable" and "least advantaged" are
Q8: Many people live in institutions that take
Q9: A _ right is a right that
Q10: The concept of _ is the process
Q11: When cell phones, computers, TVs, and batteries