What should the prioritized list of assets and their vulnerabilities and the prioritized list of threats facing the organization be combined to create?
A. risk exposure report
B. threats-vulnerabilities-assets worksheet
C. costs-risks-prevention database
D. threat assessment catalog
Answer: B
Computer Science & Information Technology
You might also like to view...
By the late 1980s, CSNET was the primary Internet backbone
Indicate whether the statement is true or false
Computer Science & Information Technology
Cascading Style Sheet rules are comprised of:
a. Selectors and Declarations b. Properties and Declarations c. Selectors and Attributes d. Elements and Attributes
Computer Science & Information Technology