The formal decision-making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) __________.
A. ARO
B. CBA
C. ALE
D. SLE
Answer: B
Computer Science & Information Technology
You might also like to view...
Unix systems record time as the number of seconds since
A. January 1, 1900 B. January 1, 1970
Computer Science & Information Technology
____________ is a device to connect a computer to a local area network (LAN).
a. Regular modem b. DSL c. Cable modem d. NIC
Computer Science & Information Technology
Because the plus symbol (+) has diverse meanings based on context, it is ____.
A. overdefined B. defined C. polyclassist D. polymorphic
Computer Science & Information Technology
A technician is connecting a PoE enabled phone and needs to run the drop from the switch that is 55 meters away. Which of the following cables types would be the MOST suitable for this purpose?
A. Fiber B. Coaxial C. CAT3 D. CAT6
Computer Science & Information Technology