________ specification indicates the impact on the organization should the particular threat in question actually eventuate.

A. Risk B. Consequence

C. Threat D. Likelihood

B. Consequence

Computer Science & Information Technology

You might also like to view...

The settings for the height and width of a video are located on the ________ tab in the Size group

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public?

A. Ransomware B. Screen scraper C. Zero-day exploit D. Bot

Computer Science & Information Technology