A(n) ________ lists out and rates the vulnerabilities of an organization

A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan

A

Business

You might also like to view...

Briefly differentiate between constant returns to specialization and diminishing returns to specialization.

What will be an ideal response?

Business

Describe network armies

What will be an ideal response?

Business