The ____ process gathers and uses information from all available sources in order to decrease the possibility of overall risks to information assets.

A. risk mitigation
B. risk management
C. risk evaluation
D. risk improvement


Answer: B

Computer Science & Information Technology

You might also like to view...

E-mail and other text files require much more bandwidth than other types of files

Indicate whether the statement is true or false

Computer Science & Information Technology

With a ________ delete, if a record on the one side of the relationship is deleted, all of the related records on the many side will be deleted

A) cascading B) foreign C) primary D) junction

Computer Science & Information Technology

Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?

A. A VPN client and VPN concentrator B. A smart jack installed for each network jack C. A managed switch with port mirroring D. A proxy server with content filter

Computer Science & Information Technology

______ is the process of defining normal versus unusual events and patterns.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology