1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
4 years ago
9

Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total

Risk=Thrat X Vulnerability X Assest Value c. Residual Risk = Total Risk - Controls d. Risk=Threat X Vulnerability
Computers and Technology
1 answer:
ss7ja [257]4 years ago
3 0

Answer:

The answer is "Option b".

Explanation:

In information security, the risk is also known as the capacity to take advantage of the vulnerabilities and the resource or group of assets, that harm the organization is described.

  • In the calculation of the total risk the three things is used that are "Threat, Vulnerability, and Asset".
  • These values are multiplied by each other, that's why except of "option b" all other choices are wrong.

You might be interested in
Wich type of operating system is usually used in personal computers
Anvisha [2.4K]
The three most common operating systems for personal computers are Microsoft Windows, Apple Mac OS X, and Linux.
4 0
3 years ago
Read 2 more answers
Lots of Ways to Use Math.random() in JavaScript
Alja [10]

Math.random() is a built-in function in JavaScript that generates a random number between 0 and 1.

<h3>What is Math.random()?</h3>

Math.random() is a useful and versatile function that can add a element of randomness to your JavaScript programs.

This function can be used in a variety of ways in JavaScript programs, such as:

  1. Generating random numbers for games or simulations.
  2. Creating random samples for statistical analysis.
  3. Shuffling elements in an array for a random order.
  4. Selecting random items from a list for a quiz or survey.
  5. Creating unique IDs or keys for objects in a database.

To Know More About built-in function, Check Out

brainly.com/question/29796505

#SPJ4

8 0
1 year ago
The area that holds all the instructions the computer needs to start up when it is powered on is ________.
stepan [7]

The area that holds all the instructions the computer needs to start up when it is powered on is b) ROM

Further Explanation:

RAM and ROM are the types of memory. RAM is the active memory. The data can be read and written from RAM. While ROM is read only which meas that data or instructions on ROM cannot be changed.

The files or instructions that are needed to start up a computer are usually unchangeable as they always have to be the same. These type of instructions are stored in ROM. When he computer is turned on, the instructions needed to start the computer are loaded into the main memory from the ROM.

Hence, ROM is the correct answer.

Learn more at:

  • brainly.com/question/10196212
  • brainly.com/question/10250188

#LearnwithBrainly

7 0
4 years ago
What data type or you use to represent true or false values?
vfiekz [6]
The Boolean type is used to represent true or false values
3 0
3 years ago
What's the purpose of IP
Slav-nsk [51]

Thank you for this question. The answer is that an Ip adress stands fo Internet Protocol which acts like a home adress. Bascily it helps you find a node in a network as the IP adress is made of letters and numbers separated by a full stop. I hope you are happy

4 0
3 years ago
Read 2 more answers
Other questions:
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • Which type of denial of service attack exploits the existence of software flaws to disrupt a service?
    12·1 answer
  • show how one version of the technology is an improvement over a previous iteration of that same technology
    11·1 answer
  • Why is it important to begin development of a software solution with a programming design in place? A programming design summari
    11·2 answers
  • The type of database that uses fields, records, and measure as data attributes is
    7·1 answer
  • What are the four common tags used on webpages?
    11·1 answer
  • What is the main difference between project tasks and client support tickets?
    11·1 answer
  • What happens when a user clicks Accept on a meeting request?
    9·2 answers
  • Explain what a datalist element does and is used for.
    12·1 answer
  • Which of the following offers more reliable antivirus protection? Question 43 options: A) antivirus software on user PCs B) anti
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!