The risk assessment deliverable titled __________ serves to rank-order each threat to the organization's information assets according to criteria developed by the organization.
A. information asset value weighted table analysis
B. risk ranking worksheet
C. threat severity weighted table analysis
D. TVA controls worksheet
Answer: C
You might also like to view...
What VLANs are included within the normal range?
A) 1-4094 B) 1-256 C) 1-1005 D) 1-512
The ____ loop condition is evaluated before the instructions within the loop are processed.
A. posttest B. pretest C. before D. after
How can the Property Sheet make query results more readable?
What will be an ideal response?
Write a line for the /etc/fstab file that mounts the /dev/sdb1 ext4 filesystem on /extra with the following characteristics: The filesystem will not be mounted automatically when the system boots, and anyone can mount and unmount the filesystem.
What will be an ideal response?