>_COMMAND ZERO
CertificationsPricing
LearnCompTIA Security+Security Program Management and Oversight
medium
Single Answer
0

Risk severity is calculated using the equation shown here. What information should be substituted for X? Risk severity = X * Impact

Answer Options

A

Inherent risk

B

MTTR (mean time to repair)

C

Likelihood of occurrence

D

RTO (recovery time objective)

Correct Answer: C

Explanation

The likelihood of occurrence, or probability, is multiplied by the impact to determine a risk’s severity.

Related Questions

  • Which of the following controls is typically the most expensive to implement?

    easy
    General Security Concepts
  • While conducting a vulnerability scan of her network, Susan discovers that a mar...

    medium
    Threats, Vulnerabilities, and Mitigations
  • John wants to write a procedure that addresses what to do if an employee inadver...

    medium
    General Security Concepts
  • You are a security administrator for your company and you identify a security ri...

    medium
    Security Program Management and Oversight
  • Which of the following is not typically true of embedded systems?

    medium
    Security Architecture
  • How many keys will be used in a typical implementation of record-level encryptio...

    hard
    General Security Concepts
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk