__________ is the risk assessment deliverable that places each information asset into a ranked list according to its value based on criteria developed by the organization.

A. information asset value weighted table analysis
B. risk ranking worksheet
C. threat severity weighted table analysis
D. TVA controls worksheet


Answer: A

Computer Science & Information Technology

You might also like to view...

Explain how a shared region could be used for a process to read data written by the kernel. Include in your explanation what would be necessary for synchronization.

What will be an ideal response?

Computer Science & Information Technology

What field property increases the speed at which searches can be performed?

A) Result Type B) Required C) Indexed D) Allow Zero Length

Computer Science & Information Technology

In a standard incident response process, which of the following steps happens after investigation?

A. Identification B. Containment C. Eradication D. Evidence gathering

Computer Science & Information Technology

The ________ is often referred to as the software environment or software platform.

A. device driver B. operating system C. utility software D. language translator

Computer Science & Information Technology