Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
A) security policy.
B) AUP.
C) risk assessment.
D) business impact analysis.
E) What-if analysis.
C
You might also like to view...
Describe, through an example, how each of the following forms of communication might be practiced in your college experience: interpersonal, small group, public, mass, and masspersonal.
What will be an ideal response?
Block codes restrict each class to a pre-specified range
Indicate whether the statement is true or false
When the principal is trying to avoid being bound by the acts of the agent after the agency has ended, constructive notice is sufficient for:
A. persons who never knew of existence of the agency. B. persons who knew of the agency but had never dealt with it before termination. C. everyone who the principal was in contract with before the termination. D. persons who have dealt with the former agent.
The balanced scorecard perspective that addresses how well the organization is meeting specific customer-based criteria is the:
a. learning and growth perspective b. internal business perspective c. customer value perspective d. financial perspective