An IT security manager is asked to provide the total risk to the business. Which of the following calculations would he security manager choose to determine total risk?

A. (Threats X vulnerability X asset value) x controls gap
B. (Threats X vulnerability X profit) x asset value
C. Threats X vulnerability X control gap
D. Threats X vulnerability X asset value


Answer: D. Threats X vulnerability X asset value

Computer Science & Information Technology

You might also like to view...

Programs that can handle all kinds of user errors are called elegant.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the timescale, by default, the ____________________ scale is measured in weeks and displays the date for the Sunday of that week.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

As you animate each part of a movie clip symbol, you can test the animation from the symbol's Timeline by pressing the ____ key.

a. ENTER b. F4 c. ESC d. ALT

Computer Science & Information Technology

In database software, fields have ____, which are characteristics that define the field.?

A. ?properties B. ?references C. ?ranges D. ?operators

Computer Science & Information Technology