What type of risk assessment uses tools such as the one shown with 4 boxes of risk using probability and level of impact as variables?

A. Quantitative
B. Loss expectancy
C. Financial
D. Qualitative


Answer: D. Qualitative

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. To avoid destroying valid output data residing in a buffer, UNIX responds to a write command by marking the appropriate buffer dirty. 2. UNIX implements pipes by taking advantage of its file system. 3. Under UNIX, although physical I/O may appear asynchronous, it is really synchronous. 4. Linux differs substantially from UNIX and Windows. 5. All Linux device drivers are in the kernel.

Computer Science & Information Technology

____ are represented in the low third of the grayscale range.

A. Midtones B. Highlights C. Tones D. Shadows

Computer Science & Information Technology

A customer wants to have a technician increase the amount of RAM in the laptop. Which of the following should the technician do FIRST before adding more memory?

A. Check for available hard drive space B. Check the laptop documentation C. Open the case to check for an available slot D. Check the operating system on the computer

Computer Science & Information Technology

Identify a true statement about the incursion phase in an advanced persistent threat.

a. An intruder gains useful information about the target. b. An intruder establishes a means of accessing a computer program that bypasses security mechanisms. c. An intruder gathers valid user credentials and installs backdoors for distributing malware. d. An intruder is ready to access compromised systems and capture information.

Computer Science & Information Technology