A business is upgrading its network infrastructure to accommodate a personnel growth of over 50% within the next six months. All preliminary planning has been completed, and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase. As part of this project, upper management is negotiating an SLA with a third party. Which of the following risk

responses is being used?

A. avoidance
B. mitigation
C. acceptance
D. transference


D
Explanation: When upper management is negotiating an SLA with a third party, the organization is using a risk response of transference. At least some of the risk of the project is being transferred to the third party.
Risk avoidance occurs when a risk is avoided by terminating the activity that causes a risk or choosing an alternative that is not as risky. Risk mitigation occurs when a risk is mitigated by reducing the risk to a tolerable level. Risk acceptance occurs when a risk is allowed.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. A common way to perform synchronization is to use Java’s built-in monitors. b. Every object has a monitor and a monitor lock (or intrinsic lock). c. A monitor ensures that its object’s monitor lock is held by a maximum of two threads at a time. d. Monitors and monitor locks can be used to enforce mutual exclusion.

Computer Science & Information Technology

What are two safeguards used by 802.11n that can protect against interference caused by channel bonding?  (Choose two.)

A. convolutional coding rate B. Dynamic Frequency Selection C. Phased Coexistence Operation D. variable guard interval

Computer Science & Information Technology

?Leveling _____.

A. ?uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system B. ?ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD) C. ?uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system D. ?ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)

Computer Science & Information Technology

To learn new skills and demonstrate proficiency within a particular area, the network administrator can obtain ____.?

A. ?certification B. ?policies C. ?ROI D. ?capacity planning

Computer Science & Information Technology