Which of the following is not one of the three risk management activities in the security management process?

A) Protections
B) Analysis
C) Measures
D) Plan


B) Analysis

Computer Science & Information Technology

You might also like to view...

The TCP normalization feature forwards abnormal packets to an administrator for further inspection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ is a predefined formula that performs simple or complex calculations.

A. function B. argument C. factor D. calculator

Computer Science & Information Technology

An id selector can be used to select several elements on a page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ accesses a structure member via the structure variable name.

a) structure member operator b) structure pointer operator c) structure arrow operator d) none of these

Computer Science & Information Technology