What should the prioritized list of assets and their vulnerabilities and the prioritized list of threats facing the organization be combined to create?

A. risk exposure report
B. threats-vulnerabilities-assets worksheet
C. costs-risks-prevention database
D. threat assessment catalog

Answer: B

Computer Science & Information Technology

You might also like to view...

By the late 1980s, CSNET was the primary Internet backbone

Indicate whether the statement is true or false

Computer Science & Information Technology

Cascading Style Sheet rules are comprised of:

a. Selectors and Declarations b. Properties and Declarations c. Selectors and Attributes d. Elements and Attributes

Computer Science & Information Technology