In a(n) __________, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores.
A. threat assessment
B. risk management program
C. weighted factor analysis
D. data classification scheme
Answer: C
Computer Science & Information Technology
You might also like to view...
The process of copying files to CDs or DVDs is referred to as:
A) duplication B) image C) sync D) burn
Computer Science & Information Technology
GUI stands for _____.
A. Graphical User Interface B. Generic User Interface C. General User Interface D. Graphical Utility Interface
Computer Science & Information Technology