In a(n) __________, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores.

A. threat assessment
B. risk management program
C. weighted factor analysis
D. data classification scheme

Answer: C

Computer Science & Information Technology

You might also like to view...

The process of copying files to CDs or DVDs is referred to as:

A) duplication B) image C) sync D) burn

Computer Science & Information Technology

GUI stands for _____.

A. Graphical User Interface B. Generic User Interface C. General User Interface D. Graphical Utility Interface

Computer Science & Information Technology