Once a company's resources are enumerated, the next step is to ________.

A. enumerate threats to each
B. classify them according to sensitivity
C. assess the degree to which each is already protected
D. create a protection plan for each


B. classify them according to sensitivity

Computer Science & Information Technology

You might also like to view...

Write a statement that reads the information in the record below from stream info to string variables courseName and courseNum and integer variable hours.

What will be an ideal response?

Computer Science & Information Technology

________ view is the view you use to enter or change data

A) Design B) Datasheet C) Layout D) Form

Computer Science & Information Technology

TCP and UDP are protocols working at the transport layer of the OSI model. They perform multiplexing using ________

A) MAC addresses B) IP addresses C) Port numbers D) Application names

Computer Science & Information Technology

? ?In the given image, which of the following types of background property does figure 4 denote?

A. ?no-repeat B. ?repeat C. ?repeat-x D. ?repeat-y

Computer Science & Information Technology