Which of the following activities is part of the risk evaluation process?
A. creating an inventory of information assets
B. classifying and organizing information assets into meaningful groups
C. assigning a value to each information asset
D. calculating the severity of risks to which assets are exposed in their current setting
Answer: D
You might also like to view...
What is the value of the expression that follows?
``` strcmp(“dog”, “Dog”); ``` a. -1 b. 0 c. 1 d. ‘\0’ e. none of the above
The CONCATENATE function is used to remove extra blank spaces from a string
Indicate whether the statement is true or false
A two-variable data table changes one value in a formula using two inputs–one from a column and one from a row
Indicate whether the statement is true or false.
What are the benefits of using full-duplex?
What will be an ideal response?