When vulnerabilities have been controlled to the degree possible, what is the remaining risk that has not been completely removed, shifted, or planned for?
A. residual risk
B. risk appetite
C. risk assurance
D. risk tolerance
Answer: A
Computer Science & Information Technology
You might also like to view...
Discussion topics for an online community are referred to as:
A) titles B) postings C) threads D) themes
Computer Science & Information Technology
Most organizations keep their information in one single data source
Indicate whether the statement is true or false
Computer Science & Information Technology