When conducting a risk assessment, which of the following should you do after identifying threats and threat likelihood? (Select the two best answers.)
A. Identify the organization's assets.
B. Identify vulnerabilities.
C. Identify a potential monetary impact.
D. Identify the impact assessment.
C and D. Step three of general risk assessments is identifying threats and threat likelihood. Afterward you should identify a potential monetary impact, which is also known as impact assessment.
You might also like to view...
The _________ namespace provides the classes and methods that you need to use to perform file processing.
a) System.IO b) System.Files c) System.Stream d) System.Windows.Forms
The Expression Web server type that allows groups to use workflow and collaboration features is ____.
A. WebDAV B. FrontPage Server Extensions C. FTP D. File System
Adjustments to the ____ value have the greatest effect in the midtones of an image.
a. Sharpness b. Brightness c. Detail d. Clarity
Which of the following is a valid SQL command?
A. DROP TABLE LEVEL1_CUSTOMER; B. DROP LEVEL1_CUSTOMER; C. DELETE LEVEL1_CUSTOMER; D. All of the above