____ is the process of placing a coherent set of countermeasures to mitigate all identified risks based on asset vulnerability and identified threats.

A. Threat management
B. Risk management
C. Profile management
D. Project management


Answer: B

Computer Science & Information Technology

You might also like to view...

In a(n) ____________________ database, tables can be related to each other and you can use that feature to make data management more efficient.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The speed of a computer

A) Is generally faster than the speed of the processor B) Is exactly the speed of the processor C) Is a result of several factors including memory, bus, and chipset speeds D) Depends upon the monitor being used

Computer Science & Information Technology

What is the purpose of the System Setup program?

A) Assign resources to all devices inside the computer. B) Reprogram the flash BIOS. C) Set system parameters. D) Configure Windows users.

Computer Science & Information Technology

Which of the following provides access to one or more applications through a single centralized interface?

A. Remote access portal B. Virtual private network C. Network access control system D. DMZ

Computer Science & Information Technology