1. NIST Special Publication 800-39, Managing Information Security Risk: Organization, Mission, and Information System View. Section 2.3, "The Risk Management Process," outlines the core components as Frame, Assess, Respond, and Monitor. The sequence in the correct answer (A) directly maps to this process: Assess (Assessment, Evaluation), Respond (Mitigation, Acceptance), and Monitor (Monitoring), all under the governance of Frame (Oversight).
2. NIST Special Publication 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations. Appendix D, "Risk Management Roles," describes Tier 1 responsibilities, which include establishing the risk management strategy and providing oversight for the entire process, confirming that Tier 1 is concerned with this complete lifecycle.
3. Carnegie Mellon University, Software Engineering Institute, OCTAVE Allegro: Information Security Risk Assessment Method. The OCTAVE method follows a similar logical progression. Phase 2 involves identifying and evaluating risks to information assets, and Phase 3 focuses on identifying risks and developing mitigation strategies, reinforcing the Assess-then-Respond sequence. (See "OCTAVE Allegro Guidebook v1.0," CMU/SEI-2007-TR-012, Steps 5-7).