Once a company's resources are enumerated, the next step is to ________.

A. create a protection plan for each
B. classify them according to sensitivity
C. enumerate threats to each
D. assess the degree to which each is already protected


B. classify them according to sensitivity

Computer Science & Information Technology

You might also like to view...

An update query only makes changes to a table once, even if you run the query multiple times

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____________________ is where you conduct your investigations and where most of your equipment and software are located, including the secure evidence containers.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The way a network is configured is called the _____.

A. network orientation B. network baseline C. network topology D. network index

Computer Science & Information Technology

Every type of Internet service requires a connection and monthly payment to a(n):

A. ISP B. MMORPG C. VoIP D. LMS

Computer Science & Information Technology