Which of the following activities is part of the risk identification process?

A. determining the likelihood that vulnerable systems will be attacked by specific threats
B. calculating the severity of risks to which assets are exposed in their current setting
C. assigning a value to each information asset
D. documenting and reporting the findings of risk analysis

Answer: C

Computer Science & Information Technology

You might also like to view...

The exact separator that follows the communications protocol depends on the ____.

A. Web server B. Web page C. Internet resource D. Internet node

Computer Science & Information Technology

If the user needs to be able to pass the privilege to other users, the GRANT command must include the ____________________ clause.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology