CIS 333 All Assignments CIS 333 All Assignments | Page 46
•
Question 18
What name is given to any risk that exists but has a defined response?
•
Question 19
What name is given to a comparison of security controls in place and the controls that
are needed to address all identified threats?
•
Question 20
__________ is rapidly becoming an increasingly important aspect of enterprise
computing.