Which of the following activities is part of the risk evaluation process?

A. creating an inventory of information assets
B. classifying and organizing information assets into meaningful groups
C. assigning a value to each information asset
D. calculating the severity of risks to which assets are exposed in their current setting


Answer: D

Computer Science & Information Technology

You might also like to view...

What is the value of the expression that follows?

``` strcmp(“dog”, “Dog”); ``` a. -1 b. 0 c. 1 d. ‘\0’ e. none of the above

Computer Science & Information Technology

The CONCATENATE function is used to remove extra blank spaces from a string

Indicate whether the statement is true or false

Computer Science & Information Technology

A two-variable data table changes one value in a formula using two inputs–one from a column and one from a row

Indicate whether the statement is true or false.

Computer Science & Information Technology

What are the benefits of using full-duplex?

What will be an ideal response?

Computer Science & Information Technology