>_COMMAND ZERO
CertificationsPricing
LearnCompTIA Security+Security Program Management and Oversight
medium
Single Answer
0

Probability and impact are used to rate what key security item?

Answer Options

A

Cost

B

Risk

C

Vulnerability

D

Audit findings

Correct Answer: B

Explanation

Risk exposure is calculated by multiplying probability and impact. Cost is measured in currency, time, or other cost metrics; vulnerability is often measured using CVSS scores; and audit findings may have criticality ratings.

Related Questions

  • What type of virtualization attack can be prevented by encrypting storage volume...

    medium
    Threats, Vulnerabilities, and Mitigations
  • Wayne wants to allow systems to claim identities as part of his AAA process. Whi...

    easy
    General Security Concepts
  • John wants to write a procedure that addresses what to do if an employee inadver...

    medium
    General Security Concepts
  • What does port security use to determine what machines or devices can connect to...

    medium
    Security Architecture
  • You are a security administrator for your company and you identify a security ri...

    medium
    Security Program Management and Oversight
  • Which of the following controls is typically the most expensive to implement?

    easy
    General Security Concepts
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk