Which of the following risk assessment methodology was developed by CERT?
A. FAIR
B. OCTAVE
C. RMF
D. CMM
Answer: B
Explanation: OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) was developed at CERT Coordination Center at Carnegie Mellon University.
You might also like to view...
The Y-axis:
A) is a horizontal line that borders the plot area to provide a frame of reference for measurement. B) is a vertical line that borders the plot area to provide a frame of reference for measurement. C) compares values for one set of data. D) is text that describes a collection of data points in a chart.
The term ________ refers to the process of updating OneDrive data to match any updates you make on your device, and vice versa
A) adjust B) sync C) align D) coordinate
______________ buttons are sets of buttons that change appearance when the user points to, presses, or clicks them.
Fill in the blank(s) with the appropriate word(s).
Which VLSM subnets will overlap? (2 answers)
A) 60.146.128.0/18 B) 60.146.64.0/18 C) 60.146.0.0/17 D) 60.146.192.0/18 E) None