Which of the following risk assessment methodologies was originally developed by CERT?

A) FAIR
B) OCTAVE
C) RMF
D) CMM


B) OCTAVE

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Virtual functions allow old code to call new code. 2) Virtual functions are implemented with a table look up that is done at run time. 3) Late binding refers to a failure to secure one’s ski boots. 4) In a class, functions declared with the virtual keyword need not be defined. 5) The virtual function mechanism binds the “right” function to objects.

Computer Science & Information Technology

The __________ is when the virus function is performed.

A. dormant phase B. propagation phase C. triggering phase D. execution phase

Computer Science & Information Technology

Though an invitee can propose a new meeting time, only the ____ can change or delete the meeting.

A. originator B. attendee C. navigator D. scheduler

Computer Science & Information Technology

A repetition or iteration loop is known as a(n) ____ structure.

A. while…do B. do…while C. if…do D. do…if

Computer Science & Information Technology