CIS 502 Course Great Wisdom / tutorialrank.com CIS 502 Course Great Wisdom / tutorialrank.com | Page 14
•
6
A security manager needs to perform a risk
assessment on a critical business application, in order to
determine what additional controls may be needed to protect the
application and its databases. The best approach to performing
this risk assessment is:
•
7
CIA is known as:
•
8
An organization has a strong, management-driven
model of security related activities such as policy, risk
management, standards, and processes. This model is better
known as:
•
9
The impact of a specific threat is defined as: