The Chief Information Officer (CIO) has asked a security analyst to determine the estimated costs associated with each potential breach of their database that contains customer information. Which of the following is the risk calculation that the CIO is asking for?

A. Impact
B. SLE
C. ARO
D. ALE

Answer: B. SLE

Computer Science & Information Technology

You might also like to view...

Match the following terms with their description

I. Power View II. Silverlight III. Horizontal multiples IV. Multiples V. Vertical multiples A. Creates engaging, interactive user experiences B. Expand across the available space C. Expands across the width and wraps down D. Encourages the creation of ad-hoc reports. E. Series of identical charts with the same x- and y-axes but that contain different values.

Computer Science & Information Technology

MC Independent configuration of a subcomponent allows:

a) the appearance of that subcomponent to be modified. b) the functionality of that subcomponent to be modified. c) Both a and b. d) None of the above

Computer Science & Information Technology