The estimated cost, loss, or damage that can result if a threat exploits a vulnerability best describes

The estimated cost, loss, or damage that can result if a threat exploits a vulnerability best describes








A) present value of risk.
B) total cost of ownership.
C) exposure.
D) risk feasibility assessment.










Answer: C


E Commerce

Learn More Multiple Choice Question :