Which of the following is not one of the three risk management activities in the security management process?

A) Protections
B) Analysis
C) Measures
D) Plan


B) Analysis

Computer Science & Information Technology

You might also like to view...

An id selector can be used to select several elements on a page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ accesses a structure member via the structure variable name.

a) structure member operator b) structure pointer operator c) structure arrow operator d) none of these

Computer Science & Information Technology

The TCP normalization feature forwards abnormal packets to an administrator for further inspection.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ is a predefined formula that performs simple or complex calculations.

A. function B. argument C. factor D. calculator

Computer Science & Information Technology