44.9k views
2 votes
The book mentioned 6 things to consider when considering prioritization. What are they?

a) Color, size, shape, texture, smell, taste.
b) Criticality, ease of exploitation, asset value, compliance, external exposure, business impact.
c) Alphabetical order, file size, file format, creation date, modification date, access rights.
d) Number of vowels, number of consonants, word length, syllable count, synonym count, antonym count.

1 Answer

3 votes

Final answer:

The correct answer is option (b) which lists criticality, ease of exploitation, asset value, compliance, external exposure, and business impact as factors for prioritization, relevant in business or cyber security contexts.

Step-by-step explanation:

The textbook you are referring to seems to discuss prioritization in a context that could be related to business, project management, or information security. Out of the options given, the one that makes the most sense in this context is (b) Criticality, ease of exploitation, asset value, compliance, external exposure, business impact. These are common criteria considered when prioritizing tasks, especially within project management or cyber security contexts. For example:

  • Criticality could relate to how essential a task or asset is to the operations of a business or the severity of a security vulnerability.
  • Ease of exploitation might be considered in assessing security threats, referring to the effort required for a threat actor to take advantage of a vulnerability.
  • Asset value refers to the importance or worth of a business asset which could be financial, strategic, or operational.
  • Compliance may involve legal or regulatory requirements that need to be addressed to avoid fines or legal issues.
  • Business impact considers the potential consequences a decision could have on business operations or profitability.

These factors would help in prioritizing actions to maximize efficiency and security in a business environment. This approach to prioritization is often found in strategic business decisions, project management methodologies, or cyber security practices.

User Donnit
by
8.4k points