The Chief Information Officer (CIO) has asked a security analyst to determine the estimated costs associated with each potential breach of their database that contains customer information. Which of the following is the risk calculation that the CIO is asking for?
A. Impact
B. SLE
C. ARO
D. ALE
Answer: B. SLE
Computer Science & Information Technology
You might also like to view...
Match the following terms with their description
I. Power View II. Silverlight III. Horizontal multiples IV. Multiples V. Vertical multiples A. Creates engaging, interactive user experiences B. Expand across the available space C. Expands across the width and wraps down D. Encourages the creation of ad-hoc reports. E. Series of identical charts with the same x- and y-axes but that contain different values.
Computer Science & Information Technology
MC Independent configuration of a subcomponent allows:
a) the appearance of that subcomponent to be modified. b) the functionality of that subcomponent to be modified. c) Both a and b. d) None of the above
Computer Science & Information Technology