____ is the process of placing a coherent set of countermeasures to mitigate all identified risks based on asset vulnerability and identified threats.
A. Threat management
B. Risk management
C. Profile management
D. Project management
Answer: B
You might also like to view...
In a(n) ____________________ database, tables can be related to each other and you can use that feature to make data management more efficient.
Fill in the blank(s) with the appropriate word(s).
The speed of a computer
A) Is generally faster than the speed of the processor B) Is exactly the speed of the processor C) Is a result of several factors including memory, bus, and chipset speeds D) Depends upon the monitor being used
What is the purpose of the System Setup program?
A) Assign resources to all devices inside the computer. B) Reprogram the flash BIOS. C) Set system parameters. D) Configure Windows users.
Which of the following provides access to one or more applications through a single centralized interface?
A. Remote access portal B. Virtual private network C. Network access control system D. DMZ