Multiple Choice
An example of a top-down approach to asset identification is
A) Reading the mission statement of the organization
B) Talking to co-workers
C) Reading on-boarding documentation
D) All of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Software assets are<br>A) Software tools needed to
Q2: The majority of information security incidents are
Q4: Hardware assets are<br>A) Software tools needed to
Q5: Based on sensitivity, assets are classified as<br>A)
Q6: Asset criticality is usually associated with the
Q7: The stages in an IT asset life
Q8: Bottom-up and top down approaches are needed
Q9: RFPs, ITNs, ITBs are associated with the<br>A)
Q10: Methods of hardware asset discovery include<br>A) Network
Q11: Required assets are those whose loss of