A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

a. risk assessment
b. backplane
c. mitigating control factor analysis
d. control verification worksheet
e. control test plan

Answer: a. risk assessment

Computer Science & Information Technology

You might also like to view...

One reason companies may create apps is for ________ marketing, a marketing technique companies use to create a buzz about a product or service

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use a menu item's __________ to assign shortcut keys to an item.

A. Edit function B. ShortcutKeys property C. Properties function D. Toolbar

Computer Science & Information Technology