When an organization has a properly implemented enterprise risk management (ERM), what is the tool used to list and categorize each discovered or encountered risk?

A. Cost/benefit equation
B. Delphi technique
C. Risk register
D. Threat model


Answer: C. Risk register

Computer Science & Information Technology

You might also like to view...

Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single message and then is discarded. Each new message requires a new key of the same length as the new message. This scheme is known as a(n) __________ .

A) pascaline B) one-time pad C) polycipher D) enigma

Computer Science & Information Technology

Name three text effects available in WordArt

What will be an ideal response?

Computer Science & Information Technology

Aa program that enables you to modify digitized videos

What will be an ideal response?

Computer Science & Information Technology

Which of the following specifies the authorization level that each user of an information asset is permitted to access, subject to the need-to-know principle?

A. discretionary access controls B. task-based access controls C. security clearances D. sensitivity levels

Computer Science & Information Technology