Once the project team for information security development has created a ranked vulnerability worksheet, it must choose one of five approaches for controlling the risks that result from the vulnerabilities. List the five approaches.
What will be an ideal response?
The five approaches are:
· Defense
· Transferal
· Mitigation
· Acceptance
· Termination
Trades & Technology
You might also like to view...
Mowing grass too low is referred to as ____________________
Fill in the blank(s) with correct word
Trades & Technology
Any young horse should be ground trained to start.
Answer the following statement true (T) or false (F)
Trades & Technology
Plants can be grown without any soil
Indicate whether the statement is true or false
Trades & Technology
How many meters are there in one centimeter?
a. 10^2 b. 10^3 c. 10^-2 d. 10^3
Trades & Technology