List of questions
Related questions
Question 9 - CCAK discussion
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
A.
Determine the impact on the controls that were selected by the organization to respond to identified risks.
B.
Determine the impact on confidentiality, integrity and availability of the information system.
C.
Determine the impact on the financial, operational, compliance and reputation of the organization.
D.
Determine the impact on the physical and environmental security of the organization, excluding informational assets.
Your answer:
0 comments
Sorted by
Leave a comment first