Which of the following activities is part of the risk identification process?

A. determining the likelihood that vulnerable systems will be attacked by specific threats
B. calculating the severity of risks to which assets are exposed in their current setting
C. assigning a value to each information asset
D. documenting and reporting the findings of risk analysis


Answer: C

Computer Science & Information Technology

You might also like to view...

Adding one to the value of a variable is known as "incrementing" the variable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a file, groups of characters form meaningful data elements called __________.

a. fields b. lists c. records d. none of the above

Computer Science & Information Technology

To test a few frames of animation, scrub by dragging the playhead along the Stage header.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

 Which of the following is primarily used to facilitate the consistent sharing of information by defining content types?

A. WML B. XML C. HTML D. XHMTL

Computer Science & Information Technology