_________ include management, operational, and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.

A. Security controls B. Risk appetite

C. Risk controls D. None of the above


A. Security controls

Computer Science & Information Technology

You might also like to view...

Class _______________ allows you to combine several controls into a single custom control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A computer in a research facility needs to have the boot order settings protected. What tool would be used to configure this?

A) Device Manager B) Configuration Management C) BIOS D) Task Manager

Computer Science & Information Technology

Which property can be set to indicate whether text in the TextBox is read-only or not?

A. InputOnly B. AcceptsText C. ReadOnly D. TextInputOnly

Computer Science & Information Technology

A bubble sort requires at most ______ passes to sort an array of n items.

a. n/2 b. n – 2 c. n – 1 d. n

Computer Science & Information Technology