Renee is using encryption to safeguard sensitive business secrets when in transit over the Internet. What risk metric is she attempting to lower?

A. Likelihood
B. RTO
C. MTO
D. Impact


Answer: A. Likelihood

Computer Science & Information Technology

You might also like to view...

The window layout option makes all MDI windows the same size and layers them so every title bar is visible (if possible).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To select an entire word in a document by using a mouse, ________ the word

A) double-click B) double-tap C) tap D) click

Computer Science & Information Technology

You can use the buttons in the Presentation Views group on the ________________ tab to switch views.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A worksheet contains addresses in column C. The addresses use commas after the street, city, and state, such as 129 Elm Street, Burlington, NC, 27215. Column D contains the phone number. You use Text to Columns to divide the addresses into multiple columns using comma delimiters. You successfully divide the addresses into four columns. What happens to the phone numbers in column D?

What will be an ideal response?

Computer Science & Information Technology