A(n) ________ lists out and rates the vulnerabilities of an organization
A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan
A
Business
A) risk matrix
B) incidence response plan
C) public key encryption scheme
D) social engineering plan
A