FUNDAMENTALS OF COMPUTER

TROUBLESHOOTING COMPUTER ISSUES

IDENTIFYING HARDWARE SOFTWARE NETWORK PROBLEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When managerial decision is made, Security of information is always a major concern, thus IT should determine risks when data is exposed, the first step to achieve this is by (KLO 3.2, unit 28)
A
Identify threats and vulnerabilities
B
Categorize potential losses
C
Determine cost-effective safeguards
D
Analyse data and report it.
Explanation: 

Detailed explanation-1: -It involves a number of steps, namely identification of assets; identification of threats; identification of existing security measures; identification of vulnerabilities; and identification of consequences.

Detailed explanation-2: -By identifying and analyzing potential vulnerabilities with an enterprise IT network, organizations can better prepare for cyber attacks and work to minimize the impact of a cyber incident, should it occur.

There is 1 question to complete.