The exposure of an asset supported by a strong control to a threat of annual occurrence is 3. The impact of the threat on the asset is very high. Using the NIST framework, the risk equals
2
1
5
4
Answer: 1
Computer Science & Information Technology
You might also like to view...
Which command executes the Java class file Welcome.class?
a. java welcome b. java Welcome.class c. java Welcome d. run Welcome.class
Computer Science & Information Technology
Describe what a shared subclass represents and how does this concept relate to multiple inheritance.
What will be an ideal response?
Computer Science & Information Technology
Instead of multiplying samples by a multiplier (like 2 or 0.5), try adding a value to them.
Computer Science & Information Technology
A user ____ is what the user sees and interacts with while an application is running.
A. service B. profile C. splash D. interface
Computer Science & Information Technology