List the four questions that are in all threat assessments.

What will be an ideal response?


1. What could go wrong?
2. How likely is it to occur?
3. What are the consequences if it does?
4. What do I need to do to counter the threat?

Computer Science & Information Technology

You might also like to view...

Select an activity of the Evaluation Phase

a. choose a web authoring tool b. verify that the HTML passes W3C validation c. determine if the goals for the website have been met d. none of the above

Computer Science & Information Technology

What should be done if a system cannot boot from the hard drive?

A. Reinstall Windows B. Boot from the Windows setup DVD C. Run System File Checker D. Replace the hard drive

Computer Science & Information Technology

In Project 2013, effort-driven scheduling ignores working and non-working times and schedules tasks to 24 hours a day

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe X.25.

What will be an ideal response?

Computer Science & Information Technology