Sara, a security analyst, is trying to prove to management what costs they could incur if their customer database was breached. This database contains 250 records with PII. Studies show that the cost per record for a breach is $300. The likelihood that their database would be breached in the next year is only 5%. Which of the following is the ALE that Sara should report to management for a security breach?
A. $1,500
B. $3,750
C. $15,000
D. $75,000
Answer: B. $3,750
You might also like to view...
Which of the following should be placed in a header file?
a. class interface b. class implementation c. inline function bodies d. (a) and (c) e. (a), (b), and (c)
Inside a workbook in Excel are sheets, each of which is called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Under what circumstances will a method receive the actual memory address of a passed array, and have access to the actual values in the array elements?
A. Only when it is passed by reference. B. Only when it is passed by value. C. Only when the array is inherited. D. Only when the array is within the method's scope.
Which of the following is an information security governance responsibility of the chief information security officer?
A. Develop policies and the program. B. Set security policy, procedures, programs, and training. C. Brief the board, customers, and the public. D. Implement incident response programs to detect security vulnerabilities and breaches.