During a code review a software developer discovers a security risk that may result in hundreds of hours of rework. The security team has classified these issues as low risk. Executive management has decided that the code will not be rewritten. This is an example of:
A. Risk avoidance
B. Risk transference
C. Risk mitigation
D. Risk acceptance
Answer: D. Risk acceptance
Computer Science & Information Technology
You might also like to view...
A _____________ is a container for other components.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Cloud computing moves processing and storage off your desktop and business hardware and puts it on the Internet
Indicate whether the statement is true or false
Computer Science & Information Technology
U.S. copyright law specifically allows us to make ____ of copyrighted works without permission.
A. grace use B. non-ownership use C. second use D. fair use
Computer Science & Information Technology
____ help you focus your attention on specific aspects of the project based on different criteria.
A. Filters B. Milestones C. Summary tasks D. All of the above
Computer Science & Information Technology