Which of the following is NOT a valid rule of thumb on risk treatment strategy selection?
A. When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.
B. When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.
C. When the attacker's potential gain is less than the costs of attack: Apply protections to decrease the attacker's cost or reduce the attacker's gain by using technical or operational controls.
D. When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.
Answer: C
You might also like to view...
The web is based on the ________ Protocol
A) Hypertext Trade B) Hypertext Transmit C) Hypertext Translate D) Hypertext Transfer
By default, audio files that are smaller than 100 KB are not added to the ________
Fill in the blank(s) with correct word
By default, AutoCorrect automatically resizes the font of text you type as a title to fit the size of the title text placeholder
Indicate whether the statement is true or false
Which of the following is not true about layout guides?
A) They are non-printing. B) They give your presentation balance and uniformity. C) They force objects to align with the guides. D) They are used to align objects.