Which of the following is BEST described by a scenario where management chooses to implement security controls to lessen the impact of a given risk?

A. Avoidance
B. Transference
C. Deterrence
D. Mitigation


Answer: D. Mitigation

Computer Science & Information Technology

You might also like to view...

Which router command displays the configured routes on a router?

a. show running-config b. show ip int brief c. show list d. show ip route

Computer Science & Information Technology

What is the greatest common denominator of 36 and 22?

A. 1 B. 2 C. 4 D. 6

Computer Science & Information Technology

A company has a server with redundant power supplies. Which of the following is this an example of?

A. Traffic shaping B. Caching engines C. Fault tolerance D. Load balancing

Computer Science & Information Technology

___________ refers to the amount of data transmitted on a circuit.

a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation

Computer Science & Information Technology