subject
Computers and Technology, 30.10.2019 05:31 naz731

Following a security assessment, the chief information security officer (ciso) is reviewing the results of the assessment and evaluating potential risk treatment strategies. as part of the ciso’s evaluation, a judgment of potential impact based on the identified risk is performed. to prioritize response actions, the ciso uses past experience to take into account the exposure factor as well as the external accessibility of the weakness identified. which of the following is the ciso performing?
a. documentation of lessons learned
b. quantitative risk assessment
c. qualitative assessment of risk
d. business impact scoring
e. threat modeling

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:10
3. bob is arguing that if you use output feedback (ofb) mode twice in a row to encrypt a long message, m, using the same key each time, it will be more secure. explain why bob is wrong, no matter what encryption algorithm he is using for block encryption (15 points).
Answers: 3
question
Computers and Technology, 23.06.2019 08:30
When you interpret the behavior of others according to your experiences and understanding of the world your evaluation is
Answers: 1
question
Computers and Technology, 24.06.2019 12:30
Nikki sent flyers in the mail to all houses within the city limits promoting her computer repair service what type of promotion is this and example of
Answers: 1
question
Computers and Technology, 24.06.2019 13:30
Which of the following is not a “fatal four” event?
Answers: 2
You know the right answer?
Following a security assessment, the chief information security officer (ciso) is reviewing the resu...
Questions
question
Mathematics, 18.03.2020 03:25
question
Chemistry, 18.03.2020 03:25
question
History, 18.03.2020 03:25
question
History, 18.03.2020 03:26
Questions on the website: 13722359