subject
Computers and Technology, 30.10.2019 05:31 naz731

Following a security assessment, the chief information security officer (ciso) is reviewing the results of the assessment and evaluating potential risk treatment strategies. as part of the ciso’s evaluation, a judgment of potential impact based on the identified risk is performed. to prioritize response actions, the ciso uses past experience to take into account the exposure factor as well as the external accessibility of the weakness identified. which of the following is the ciso performing?
a. documentation of lessons learned
b. quantitative risk assessment
c. qualitative assessment of risk
d. business impact scoring
e. threat modeling

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 21:00
Ulia is planning to attend the same private four-year college her parents attended. she wants to save at least $18,000 in four years to contribute to her college education. which monthly deposit amounts can julia use to achieve her goal? check all that apply.
Answers: 2
question
Computers and Technology, 23.06.2019 09:30
Facial expressions and gestures are examples of messages.
Answers: 3
question
Computers and Technology, 23.06.2019 10:00
How do i delete my account on this because i didn't read this agreements and also i put age at xd
Answers: 1
question
Computers and Technology, 24.06.2019 04:30
Fall protection, confined space entry procedures, controlled noise levels, and protection from chemical hazards are some of the things that contribute to a safe what
Answers: 1
You know the right answer?
Following a security assessment, the chief information security officer (ciso) is reviewing the resu...
Questions
question
Mathematics, 13.05.2021 20:40
question
Mathematics, 13.05.2021 20:40
question
Mathematics, 13.05.2021 20:40
question
Mathematics, 13.05.2021 20:40
Questions on the website: 13722367