The ____ process gathers and uses information from all available sources in order to decrease the possibility of overall risks to information assets.
A. risk mitigation
B. risk management
C. risk evaluation
D. risk improvement
Answer: B
You might also like to view...
E-mail and other text files require much more bandwidth than other types of files
Indicate whether the statement is true or false
With a ________ delete, if a record on the one side of the relationship is deleted, all of the related records on the many side will be deleted
A) cascading B) foreign C) primary D) junction
Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
A. A VPN client and VPN concentrator B. A smart jack installed for each network jack C. A managed switch with port mirroring D. A proxy server with content filter
______ is the process of defining normal versus unusual events and patterns.
Fill in the blank(s) with the appropriate word(s).