Which of the following is BEST described by a scenario where management chooses to implement security controls to lessen the impact of a given risk?
A. Avoidance
B. Transference
C. Deterrence
D. Mitigation
Answer: D. Mitigation
Computer Science & Information Technology
You might also like to view...
Which router command displays the configured routes on a router?
a. show running-config b. show ip int brief c. show list d. show ip route
Computer Science & Information Technology
What is the greatest common denominator of 36 and 22?
A. 1 B. 2 C. 4 D. 6
Computer Science & Information Technology
A company has a server with redundant power supplies. Which of the following is this an example of?
A. Traffic shaping B. Caching engines C. Fault tolerance D. Load balancing
Computer Science & Information Technology
___________ refers to the amount of data transmitted on a circuit.
a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation
Computer Science & Information Technology