A business is upgrading its network infrastructure to accommodate a personnel growth of over 50% within the next six months. All preliminary planning has been completed, and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase. As part of this project, upper management is negotiating an SLA with a third party. Which of the following risk
responses is being used?
A. avoidance
B. mitigation
C. acceptance
D. transference
D
Explanation: When upper management is negotiating an SLA with a third party, the organization is using a risk response of transference. At least some of the risk of the project is being transferred to the third party.
Risk avoidance occurs when a risk is avoided by terminating the activity that causes a risk or choosing an alternative that is not as risky. Risk mitigation occurs when a risk is mitigated by reducing the risk to a tolerable level. Risk acceptance occurs when a risk is allowed.
You might also like to view...
Which of the following statements is false?
a. A common way to perform synchronization is to use Java’s built-in monitors. b. Every object has a monitor and a monitor lock (or intrinsic lock). c. A monitor ensures that its object’s monitor lock is held by a maximum of two threads at a time. d. Monitors and monitor locks can be used to enforce mutual exclusion.
What are two safeguards used by 802.11n that can protect against interference caused by channel bonding? (Choose two.)
A. convolutional coding rate B. Dynamic Frequency Selection C. Phased Coexistence Operation D. variable guard interval
?Leveling _____.
A. ?uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system B. ?ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD) C. ?uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system D. ?ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)
To learn new skills and demonstrate proficiency within a particular area, the network administrator can obtain ____.?
A. ?certification B. ?policies C. ?ROI D. ?capacity planning