When conducting a risk assessment, which of the following should you do after identifying threats and threat likelihood? (Select the two best answers.)

A. Identify the organization's assets.
B. Identify vulnerabilities.
C. Identify a potential monetary impact.
D. Identify the impact assessment.

C and D. Step three of general risk assessments is identifying threats and threat likelihood. Afterward you should identify a potential monetary impact, which is also known as impact assessment.

Computer Science & Information Technology

You might also like to view...

Brightness of a picture can be adjusted from the ________ group

A) Adjust B) Arrange C) Styles D) Corrections

Computer Science & Information Technology

A motivated computer user buys a new motherboard for his computer. After taking a hardware repair course through the local college, he disassembles his old computer, replaces the old motherboard, and reassembles his computer. He discovers there is only one mini-DIN connector on the motherboard and it is designated for the keyboard. What should he do?

A) Return the motherboard for a full refund and reinstall the old motherboard. B) Insert the keyboard into the serial port. C) Install a DIN-to-USB converter on the mouse and use a USB port. D) Buy a new keyboard.

Computer Science & Information Technology