subject
Computers and Technology, 30.10.2019 05:31 naz731

Following a security assessment, the chief information security officer (ciso) is reviewing the results of the assessment and evaluating potential risk treatment strategies. as part of the ciso’s evaluation, a judgment of potential impact based on the identified risk is performed. to prioritize response actions, the ciso uses past experience to take into account the exposure factor as well as the external accessibility of the weakness identified. which of the following is the ciso performing?
a. documentation of lessons learned
b. quantitative risk assessment
c. qualitative assessment of risk
d. business impact scoring
e. threat modeling

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 20:00
An excel which cell contains =b2 is copied to row below, the same column. what will be the new cell's content
Answers: 2
question
Computers and Technology, 23.06.2019 05:20
Which operating system is a version of linux?
Answers: 1
question
Computers and Technology, 23.06.2019 07:50
Apython programming question: assume s is a string of lower case characters. write a program that prints the number of times the string 'bob' occurs in s. for example, if s = 'azcbobobegghakl', then your program should print number of times bob occurs is: 2
Answers: 3
question
Computers and Technology, 23.06.2019 09:00
Which best compares appointments and events in outlook 2010appointments have a subject man, and events do notappointments have a specific date or range of dates, and events do notappointments have a start and end time of day, and events do notappointments have a location option, and events do not
Answers: 2
You know the right answer?
Following a security assessment, the chief information security officer (ciso) is reviewing the resu...
Questions
Questions on the website: 13722367