The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mitigated by current controls + the uncertainty of current knowledge of the vulnerability are each examples of_____.
A. Risk assessment estimate factors.
B. Vulnerability mitigation controls.
C. Attack analysis calculation.
D. Exploit likelihood equation.