Multiple Choice
Match each statement with an item below.
-The risk that remains to the information asset even after the existing control has been applied.
A) Threat agent
B) Intellectual property
C) Hacker
D) Computer viruses
E) Trojan
F) Risk management
G) Likelihood
H) Residual risk
I) Standards
Correct Answer:

Verified
Correct Answer:
Verified
Q1: What are the steps in contingency planning?
Q2: _ is defined as "the ownership of
Q3: The threat of corruption can occur while
Q4: A(n)_ is prepared by the organization to
Q5: An asset can be logical,such as a
Q7: The _ has been the industry standard
Q8: A(n)_ is a category of objects,persons,or other
Q9: What are the subordinate functions of contingency
Q10: <i>Match each statement with an item below.</i><br>-The
Q11: What is difference between access control lists