CIS 333 All Assignments CIS 333 All Assignments | Page 46

• Question 18 What name is given to any risk that exists but has a defined response? • Question 19 What name is given to a comparison of security controls in place and the controls that are needed to address all identified threats? • Question 20 __________ is rapidly becoming an increasingly important aspect of enterprise computing.