>_COMMAND ZERO
CertificationsPricing
LearnCompTIA Security+Security Program Management and Oversight
medium
Single Answer
0

Probability and impact are used to rate what key security item?

Answer Options

A

Cost

B

Risk

C

Vulnerability

D

Audit findings

Correct Answer: B

Explanation

Risk exposure is calculated by multiplying probability and impact. Cost is measured in currency, time, or other cost metrics; vulnerability is often measured using CVSS scores; and audit findings may have criticality ratings.

Related Questions

  • What does port security use to determine what machines or devices can connect to...

    medium
    Security Architecture
  • Which of the following concepts defines a company goal for system restoration an...

    medium
    Security Program Management and Oversight
  • John wants to write a procedure that addresses what to do if an employee inadver...

    medium
    General Security Concepts
  • Which of the following is not typically true of embedded systems?

    medium
    Security Architecture
  • Wayne wants to allow systems to claim identities as part of his AAA process. Whi...

    easy
    General Security Concepts
  • Jared is responsible for network security at his company. He has discovered beha...

    medium
    Threats, Vulnerabilities, and Mitigations
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk