Multiple Choice
If,during a risk-handling evaluation,the organization determines that there is a valid threat source and the system is vulnerable to attack then ____.
A) risk of loss exists
B) risk can be accepted
C) the system is exploitable
D) unacceptable risk must be controlled
Correct Answer:

Verified
Correct Answer:
Verified
Q72: Some organizations document the outcome of the
Q73: If the organization has information assets totaling
Q74: Corporations that previously used IT systems to
Q75: _ is a is a combined function
Q76: Select the list of mitigation strategies in
Q78: The original OCTAVE method,which forms the basis
Q79: The element of remaining risk after vulnerabilities
Q80: _ feasibility examines whether the organization has
Q81: Before deciding on the risk control strategy
Q82: In a cost-benefit analysis,the _ is the