Search
.Management Sciences
A. Asset
B. Control
C. Vulnerability
D. None of the mentioned
Explanation: The answer is self explanatory.
Related Mcqs:
- A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
- A. Vulnerability B. Attack C. Threat D. Exposure...
- Consider a case where the system is unavailable and cannot deliver its services to users. What type of failure is being described here ?
- A. Loss of service B. Incorrect service delivery C. System/data corruption D. None of the mentioned...
- What is the term for development process organised such that faults in the system are detected and repaired before delivery to the customer ?
- A. Fault Avoidance B. Fault detection C. Fault tolerance D. None of the mentioned...
- Circumstances that have potential to cause loss or harm is known as___________________?
- A. Attack B. Threat C. Vulnerability D. Control...
- Which of the following is a technique covered in Static Analysis ?
- A. Formal verification B. Model checking C. Automated program analysis D. All of the mentioned...
Recent Comments