When conducting a risk assessment, which of the following should you do after identifying threats and threat likelihood? (Select the two best answers.)

A. Identify the organization's assets.
B. Identify vulnerabilities.
C. Identify a potential monetary impact.
D. Identify the impact assessment.


C and D. Step three of general risk assessments is identifying threats and threat likelihood. Afterward you should identify a potential monetary impact, which is also known as impact assessment.

Computer Science & Information Technology

You might also like to view...

The _________ namespace provides the classes and methods that you need to use to perform file processing.

a) System.IO b) System.Files c) System.Stream d) System.Windows.Forms

Computer Science & Information Technology

The Expression Web server type that allows groups to use workflow and collaboration features is ____.

A. WebDAV B. FrontPage Server Extensions C. FTP D. File System

Computer Science & Information Technology

Adjustments to the ____ value have the greatest effect in the midtones of an image.

a. Sharpness b. Brightness c. Detail d. Clarity

Computer Science & Information Technology

Which of the following is a valid SQL command?

A. DROP TABLE LEVEL1_CUSTOMER; B. DROP LEVEL1_CUSTOMER; C. DELETE LEVEL1_CUSTOMER; D. All of the above

Computer Science & Information Technology