________ is a risk-based strategic assessment and planning technique used primarily for security but which also can be used for disaster recovery planning purposes
A) Asset-based Risk Assessment B) Business Impact Analysis
C) Disaster-based Risk Assessment D) OCTAVE
D
Computer Science & Information Technology
You might also like to view...
Types in Java are divided into two categories. The primitive types are boolean, byte, char, short, int, long, float and double. All other types are ________ types.
a. static b. reference c. declared d. source
Computer Science & Information Technology
A ________________ is used to test a class.
A. class tester B. testing machine C. class interface D. test driver
Computer Science & Information Technology
Re-contextualizing your practice hinders the growth of your business
Indicate whether the statement is true or false
Computer Science & Information Technology
Repetition and sequence are alternate names for a loop structure.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology