The calculation of the likelihood of an attack coupled with the attack frequency to determine the expected number of losses within a specified time range is called the __________.

A. loss frequency
B. annualized loss expectancy
C. likelihood
D. benefit of loss


Answer: A

Computer Science & Information Technology

You might also like to view...

A function may return a pointer, but the programmer must ensure that the pointer

A) is pointing to an object that is still valid after the return of the function. B) has been assigned an address. C) was received as a parameter by the function. D) has not previously been returned by another function. E) None of the above

Computer Science & Information Technology

The ____ includes a button that enables you to display all of your apps.

A. Menu bar B. Toolbar C. App bar D. Shortcut bar

Computer Science & Information Technology

The ________ can be used to change the size of a placeholder

A) Grasp Object button B) rotate handle C) sizing handles D) Adjust Placeholder group

Computer Science & Information Technology

You are given the following information about the IP address of a host connected to the network, 172.16.112.1/25. Determine the number of network (N), subnet (S), and host (H) bits. Which of the following statements are TRUE?

A) N = 24 B) S = 14 C) H = 7 D) S = 6

Computer Science & Information Technology