A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
a. risk assessment
b. backplane
c. mitigating control factor analysis
d. control verification worksheet
e. control test plan
Answer: a. risk assessment
Computer Science & Information Technology
You might also like to view...
One reason companies may create apps is for ________ marketing, a marketing technique companies use to create a buzz about a product or service
Fill in the blank(s) with correct word
Computer Science & Information Technology
Use a menu item's __________ to assign shortcut keys to an item.
A. Edit function B. ShortcutKeys property C. Properties function D. Toolbar
Computer Science & Information Technology