Rather than making the effort to conduct a detailed assessment of the cost of recovery from an attack when estimating the danger from possible threats, organizations often __________.
A. create a subjective ranking based on anticipated recovery costs
B. estimate cost from past experience
C. leave the value empty until later in the process
D. use a consultant to calculate an exact value
Answer: A
Computer Science & Information Technology
You might also like to view...
What happens if a live migration fails?
What will be an ideal response?
Computer Science & Information Technology
____ is used for documents containing mathematical content, symbols, equations, and operations.
A. XHTML B. CML C. MathML D. Equex
Computer Science & Information Technology
A ________ provides a group of related commands for Windows applications.
a) separator bar b) hot key c) menu d) margin indicator bar
Computer Science & Information Technology
What are the benefits of distributed systems?
What will be an ideal response?
Computer Science & Information Technology