Which of the following BEST describes the primary role of a risk assessment as it relates to compliance with risk-based frameworks?

A. It demonstrates the organization's mitigation of risks associated with internal threats.
B. It serves as the basis for control selection.
C. It prescribes technical control requirements
D. It is an input to the business impact assessment


Answer: B. It serves as the basis for control selection.

Computer Science & Information Technology

You might also like to view...

if you were designing a Web-based system to make airline reservations and to sell airline tickets, which DBMS Architecture would you choose from Section 2.5? Why? Why would the other architectures not be a good choice?

What will be an ideal response?

Computer Science & Information Technology

The ________ option stops a worksheet tab from being displayed at the bottom of a workbook

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A well documented Window's OS vulnerability was null sessions. What Windows operating system was the first to disable null sessions by default?

A. Windows Server 2012 B. Windows Server 2008 C. Windows Server 2003 D. Windows 8.1

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 2-1Chloe is putting together a presentation in which she explains how printers work. Chloe learns in her research that maps, blueprints, advertising banners, and other large documents can be printed on ____ ink-jet printers.

A. wide-format B. mobile C. 3D D. barcode

Computer Science & Information Technology