A structured approach used to oversee and manage risk for an enterprise
Correct Answer:
C
What is knowledge based authentication
Correct Answer:
A
1 ______ is a weighted factor based on a subjective analysis of the probability that a given threat or set of threats is capable of exploiting a given vulnerability or set of vulnerabilities.
Correct Answer:
A
A cyber security professional observes an unusual occurrence in the network or system. What term best describes this situations
Correct Answer:
C
What is sensitivity in the context of confidentiality
Correct Answer:
C