Multiple Choice
What is the first step involved in risk management?
A) determining the cause of damage
B) evaluating controls and filling in security gaps
C) understanding what information assets need protection
D) recovering the system from damage
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q55: Write a brief note on encryption of
Q56: According to the incidence response plan, which
Q57: Which of the laws stipulates how financial
Q58: Which of the following authentication strategies is
Q59: The term _ refers to software that
Q61: Evelyn Birch is a freelance content writer
Q62: _ consists of intangible assets which are
Q63: Discuss how malware and botnets threaten the
Q64: The term _ refers to configured computers
Q65: Discuss some of the possible drawbacks of