Once the project team for information security development has created a ranked vulnerability worksheet, it must choose one of five approaches for controlling the risks that result from the vulnerabilities. List the five approaches.

What will be an ideal response?


The five approaches are:
      · Defense
      · Transferal
      · Mitigation
      · Acceptance
      · Termination

Trades & Technology

You might also like to view...

Mowing grass too low is referred to as ____________________

Fill in the blank(s) with correct word

Trades & Technology

Any young horse should be ground trained to start.

Answer the following statement true (T) or false (F)

Trades & Technology

Plants can be grown without any soil

Indicate whether the statement is true or false

Trades & Technology

How many meters are there in one centimeter?

a. 10^2 b. 10^3 c. 10^-2 d. 10^3

Trades & Technology