During a code review a software developer discovers a security risk that may result in hundreds of hours of rework. The security team has classified these issues as low risk. Executive management has decided that the code will not be rewritten. This is an example of:

A. Risk avoidance
B. Risk transference
C. Risk mitigation
D. Risk acceptance


Answer: D. Risk acceptance

Computer Science & Information Technology

You might also like to view...

A _____________ is a container for other components.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Cloud computing moves processing and storage off your desktop and business hardware and puts it on the Internet

Indicate whether the statement is true or false

Computer Science & Information Technology

U.S. copyright law specifically allows us to make ____ of copyrighted works without permission.

A. grace use B. non-ownership use C. second use D. fair use

Computer Science & Information Technology

____ help you focus your attention on specific aspects of the project based on different criteria.

A. Filters B. Milestones C. Summary tasks D. All of the above

Computer Science & Information Technology