Which of the following best describes residual risk?

A. The likelihood of occurrence of a threat
B. The level of risk before security measures are applied
C. The level of risk after security measures are applied
D. The impact of risk if a threat is realized


Answer: C
Explanation: Residual risk is the level of risk after security measures have been applied. The level of risk before security measures are applied is the inherent risk.

Computer Science & Information Technology

You might also like to view...

Floating-point literals are of type ________ by default.

a. float b. double c. real d. decimal

Computer Science & Information Technology

The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.

A. arrives only when you use the app, downloaded and installed B. is downloaded and installed, retrieved from the cloud C. is downloaded and installed, retrieved only when you use the app D. none of the above

Computer Science & Information Technology

A(n) ________ is a program that provides modules of prewritten code.

A. artificial intelligence B. pseudocode C. application generator D. machine language

Computer Science & Information Technology

A _______ is an independent review and examination of a system’s records and activities.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology