The results of the risk analysis should be documented in a _________.
A. journal B. consequence
C. risk register D. none of the above
C. risk register
Computer Science & Information Technology
You might also like to view...
What is Web analytics?
What will be an ideal response?
Computer Science & Information Technology
One of the functions of a firewall is to protect against:
A) ISPs B) WANs C) hackers D) scripters
Computer Science & Information Technology
Holding down the Alt button, and pressing the Tab key repeatedly cycles through all ________
A) pinned applications B) open windows C) Microsoft Office applications D) programs on the computer
Computer Science & Information Technology
The set of information technology (IT) hardware, software, and networks in an organization is called its _____.
a. IT organization b. IT hierarchy c. IT infrastructure d. IT board
Computer Science & Information Technology