Which of the following activities is part of the risk identification process?
A. determining the likelihood that vulnerable systems will be attacked by specific threats
B. calculating the severity of risks to which assets are exposed in their current setting
C. assigning a value to each information asset
D. documenting and reporting the findings of risk analysis
Answer: C
You might also like to view...
Adding one to the value of a variable is known as "incrementing" the variable.
Answer the following statement true (T) or false (F)
In a file, groups of characters form meaningful data elements called __________.
a. fields b. lists c. records d. none of the above
To test a few frames of animation, scrub by dragging the playhead along the Stage header.
Answer the following statement true (T) or false (F)
Which of the following is primarily used to facilitate the consistent sharing of information by defining content types?
A. WML B. XML C. HTML D. XHMTL