________ is a risk-based strategic assessment and planning technique used primarily for security but which also can be used for disaster recovery planning purposes

A) Asset-based Risk Assessment B) Business Impact Analysis
C) Disaster-based Risk Assessment D) OCTAVE


D

Computer Science & Information Technology

You might also like to view...

Types in Java are divided into two categories. The primitive types are boolean, byte, char, short, int, long, float and double. All other types are ________ types.

a. static b. reference c. declared d. source

Computer Science & Information Technology

A ________________ is used to test a class.

A. class tester B. testing machine C. class interface D. test driver

Computer Science & Information Technology

Re-contextualizing your practice hinders the growth of your business

Indicate whether the statement is true or false

Computer Science & Information Technology

Repetition and sequence are alternate names for a loop structure.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology