Which of the following uses the equation SLE X ARO = ALE?

A. Qualitative risk assessment
B. Passive security analysis
C. Quantitative risk assessment
D. Active security analysis


C. Quantitative risk assessment uses the equation SLE X ARO = ALE.

Computer Science & Information Technology

You might also like to view...

When you change the size of a selection, it is called ________ .

a. resizing b. rescaling c. scaling d. repositioning

Computer Science & Information Technology

________ is malware that tries to convince you that your computer is infected with a virus

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using a rule, you can apply ________ to appointments on your calendar to help remind yourself that a meeting is important

A) a graphic B) exclamation points C) conditional formatting D) asterisks

Computer Science & Information Technology

<> is an example of a(n) ________

A) address block B) merge field C) record D) insert control

Computer Science & Information Technology