When an organization has a properly implemented enterprise risk management (ERM), what is the tool used to list and categorize each discovered or encountered risk?
A. Cost/benefit equation
B. Delphi technique
C. Risk register
D. Threat model
Answer: C. Risk register
You might also like to view...
Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single message and then is discarded. Each new message requires a new key of the same length as the new message. This scheme is known as a(n) __________ .
A) pascaline B) one-time pad C) polycipher D) enigma
Name three text effects available in WordArt
What will be an ideal response?
Aa program that enables you to modify digitized videos
What will be an ideal response?
Which of the following specifies the authorization level that each user of an information asset is permitted to access, subject to the need-to-know principle?
A. discretionary access controls B. task-based access controls C. security clearances D. sensitivity levels