The results of the risk analysis should be documented in a _________.

A. journal B. consequence

C. risk register D. none of the above


C. risk register

Computer Science & Information Technology

You might also like to view...

What is Web analytics?

What will be an ideal response?

Computer Science & Information Technology

One of the functions of a firewall is to protect against:

A) ISPs B) WANs C) hackers D) scripters

Computer Science & Information Technology

Holding down the Alt button, and pressing the Tab key repeatedly cycles through all ________

A) pinned applications B) open windows C) Microsoft Office applications D) programs on the computer

Computer Science & Information Technology

The set of information technology (IT) hardware, software, and networks in an organization is called its _____.

a. IT organization b. IT hierarchy c. IT infrastructure d. IT board

Computer Science & Information Technology