1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
3 years ago
12

In Cybersecurity terminology, a risk is defined as ________. Select one: a. A weakness that threatens the confidentiality, integ

rity, or availability of data b. Something or someone that can damage, disrupt, or destroy an asset c. Estimated cost, loss, or damage that can result from an exploit d. The probability of a threat exploiting a vulnerability
Computers and Technology
1 answer:
deff fn [24]3 years ago
4 0

Answer:

The probability of a threat exploiting a vulnerability and the resulting cost

Explanation:

The whole idea of IT security is to protect our data from bad things. Risk in cyber security is the potential to harm people, organizations and IT equipment. It is the probability that a particular threat will occur and as result, leave a system vulnerable.

You might be interested in
A series of events that gets the computer ready for work is known as what?
DedPeter [7]
I think the answer is the third one...
7 0
4 years ago
Read 2 more answers
Which two items define a person's online identity? (choose two)
elena-14-01-66 [18.8K]
1 & 4 because social media’s are your identity and posts show what you’re doing and what you’re posting about yourself / other people.
8 0
3 years ago
What is the best data type for traveling day?
kykrilka [37]
Here if its wrong sorry

7 0
3 years ago
Which platform allows people to buy of digitized books online from anywhere?
VladimirAG [237]

D. Copia is the correct answer i just took the test!

4 0
4 years ago
Read 2 more answers
Give 4 examples of mnemonic codes, and what do they do?
KengaRu [80]

Answer:

ya

Explanation:

ya

3 0
3 years ago
Other questions:
  • Before desktop computers made italic fonts available in the home and office, writers used underlining to:
    12·1 answer
  • In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboar
    14·1 answer
  • Which inserted element in an email message displays a graphic from a data source
    15·2 answers
  • Două numere a și b sunt numite generatoare ale unui număr natural n dacă a∙b+[a/b]=n, unde s-a notat cu [c] partea întreagă a nu
    7·1 answer
  • Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:5! = 5 * 4 * 3 * 2 * 1 = 120
    11·1 answer
  • Communication is defined as__________.
    10·1 answer
  • Why are computers assigned IP addresses
    15·1 answer
  • 6. Assume there are three small caches, each consisting of four one-word blocks. One cache is fully associative, a second is two
    5·1 answer
  • Why do many experts recommand longer time horizonal if you are doing high risk investment
    7·1 answer
  • Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which ke
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!