An IT security manager is asked to provide the total risk to the business. Which of the following calculations would he security manager choose to determine total risk?
A. (Threats X vulnerability X asset value) x controls gap
B. (Threats X vulnerability X profit) x asset value
C. Threats X vulnerability X control gap
D. Threats X vulnerability X asset value
Answer: D. Threats X vulnerability X asset value
You might also like to view...
Programs that can handle all kinds of user errors are called elegant.
Answer the following statement true (T) or false (F)
In the timescale, by default, the ____________________ scale is measured in weeks and displays the date for the Sunday of that week.
Fill in the blank(s) with the appropriate word(s).
As you animate each part of a movie clip symbol, you can test the animation from the symbol's Timeline by pressing the ____ key.
a. ENTER b. F4 c. ESC d. ALT
In database software, fields have ____, which are characteristics that define the field.?
A. ?properties B. ?references C. ?ranges D. ?operators