What is the final step in the risk identification process?

A. assessing values for information assets
B. classifying and categorizing assets
C. identifying and inventorying assets
D. ranking assets in order of importance


Answer: D

Computer Science & Information Technology

You might also like to view...

Suppose this is embedded in an otherwise correct and complete program. Which version of f() will be called?

Suppose class D is derived from class B, and class B has a public member function whose declaration is void f();. Suppose class D has its version of the function, void f(). Here is a pointer definition and an access to a member function.. ``` B* bPtr = new D; BPtr->f(); ``` a) D::f() b) B::f() c) This is illegal. You can’t assign a D object to a variable of type pointer to B.

Computer Science & Information Technology

Matthew faces some network issues with his office system. As the IT help desk team of his company is on leave, he accesses the server room himself and rectifies the problem. However, only the help desk members are allowed to enter the server room. In this scenario, Matthew can be accused of _____.

A. ?accredited entry B. ?unauthorized access C. ?denial of service D. ?legitimate attack

Computer Science & Information Technology

Which function is considered to be an advanced firewall feature?

A. Providing entry and exit points such as TCP port 80 for Web page content B. Allowing information that meets specified security criteria (such as an approved IP address) to pass C. Logging of unauthorized accesses both into and out of a network D. Providing a VPN link to another network

Computer Science & Information Technology

A _____ shows how an object changes from one state to another, depending on events that affect the object.

A. state transition diagram B. case tools diagram C. scatter diagram D. business process diagram

Computer Science & Information Technology