Question 455:
Information security managers should use risk assessment techniques to:
Answer options:
A. justify selection of risk mitigation strategies. B. maximize the return on investment (ROD.C. provide documentation for auditors and regulators. D. quantify risks that would otherwise be subjective.