1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
4 years ago
9

Which of the following is the formula used to calculate the risk that remains after you apply controls? a. ALE=SLExARO b. Total

Risk=Thrat X Vulnerability X Assest Value c. Residual Risk = Total Risk - Controls d. Risk=Threat X Vulnerability
Computers and Technology
1 answer:
ss7ja [257]4 years ago
3 0

Answer:

The answer is "Option b".

Explanation:

In information security, the risk is also known as the capacity to take advantage of the vulnerabilities and the resource or group of assets, that harm the organization is described.

  • In the calculation of the total risk the three things is used that are "Threat, Vulnerability, and Asset".
  • These values are multiplied by each other, that's why except of "option b" all other choices are wrong.

You might be interested in
Ben sends a few emails over the weekend to his relatives. Where should Ben place his laptop so that he can avoid slouching while
bonufazy [111]

Answer:

C. obviously its the most stable think.

Explanation:

3 0
3 years ago
The type of power that has the ability to call on connections and networks both inside and outside the organization for support
givi [52]

Answer: c) Connection power

Explanation:

Connection power is the power that is established personally in the field of business.A person having connection with powerful person personally outside or inside the organizational field then he/she can attain the desired goals or result through connecting with them, influencing powerful person's decision, getting their things done etc .

  • Other options are incorrect because association power, information power,coercive power and referent power are the power to establish connection organization to achieved aim.
  • Thus, the correct option is option(c)
5 0
3 years ago
Which question best addresses the issue of risk with a new job?
jolli1 [7]
The last answer seems most appropriate
5 0
4 years ago
Read 2 more answers
Ryan has made a presentation of ten slides, which he wants to display in sequence after a specific time interval. Which element
erastovalidia [21]
Open Slide how Tab Then Set up Group and then  Select Rehearse set each slide time according to your requirement
6 0
3 years ago
Read 2 more answers
Please help me asapppp!​
I am Lyosha [343]

Answer:

1.  Formula is A2 : A9 = COUNT( A2: A9 ) = 8

2. Formula is SUM( A2: A9 ) = 36

3. Formula is B2 : B9 = COUNT( B2: B9) = 8

4. Formula is  MAX( C2: C9) = 5

5. Formula is MIN( C4: C8) = 3

6. Formula is SUM( C5 - C6) = 0

7. Formula is AVERAGE( C2: C9) = 4

Explanation: Have a nice day!✌️

6 0
3 years ago
Other questions:
  • According to the ________ definition of organizations, an organization is seen as a means by which primary production factors ar
    14·1 answer
  • Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
    7·2 answers
  • What's the name of all kind of money around the world
    5·2 answers
  • Lets computer know what to do when it starts up...
    9·1 answer
  • The first form of the rocket is believed have been developed in _?
    14·2 answers
  • ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect
    13·1 answer
  • In what tab can a user find the workspace option?
    8·1 answer
  • In a void function, the return statement is not necessarily. True or false? ​
    11·2 answers
  • What can a user modify on a business card using the Edit Business card in the dialog box?​
    8·1 answer
  • Can you answer this ?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!