The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
tigated by current controls + the uncertainty of current knowledge of the vulnerability are each examples of_____. A. Risk assessment estimate factors.
B. Vulnerability mitigation controls.
C. Attack analysis calculation.
D. Exploit likelihood equation.