________ specification indicates the impact on the organization should the particular threat in question actually eventuate.
A. Risk B. Consequence
C. Threat D. Likelihood
B. Consequence
Computer Science & Information Technology
You might also like to view...
The settings for the height and width of a video are located on the ________ tab in the Size group
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public?
A. Ransomware B. Screen scraper C. Zero-day exploit D. Bot
Computer Science & Information Technology