What is the probability that a threat agent will exploit vulnerability and the impact if the threat is carried out?

A. Exposure
B. Countermeasure
C. Risk
D. Due diligence


C Risk is the probability that a threat agent will exploit vulnerability and the impact if the threat is carried out.

Computer Science & Information Technology

You might also like to view...

How do players know they have reached your game’s “final” victory condition?

What will be an ideal response?

Computer Science & Information Technology

The ________ element identifies a term in a definition list

A) B)

C)
D)

Computer Science & Information Technology

____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?Which option below is not a recommendation for securing storage containers?

A. ?The container should be located in a restricted area. B. ?Only authorized access should be allowed, and it should be kept to a minimum. C. ?Evidence containers should remain locked when they aren't under direct supervision. D. ?Rooms with evidence containers should have a secured wireless network.

Computer Science & Information Technology