All of the following are rules of thumb for selecting a risk treatment strategy EXCEPT:                                   

A. When a vulnerability exists in an important asset, implement security controls to reduce the likelihood of a vulnerability being exploited.
B. When the likelihood of an attack is high and the impact is great, outsource security efforts so that any resulting loss is fiscally someone else's responsibility.
C. When a vulnerability can be exploited, apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.
D. When the potential loss is substantial, apply design principles, architectural designs, and technical and nontechnical protections to limit the extent of the attack, thereby reducing the potential for loss.


Answer: B

Computer Science & Information Technology

You might also like to view...

Visual Basic includes tools

a) for drawing 2-D shapes b) for controlling colors and fonts c) to support graphics that enable programmers to enhance their Windows apps visually d) All of the above

Computer Science & Information Technology

Thesrandfunction, that initializes the C++ random number generator, is an example of a void function.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which tool do you use to select multiple regions in a live paint group?

What will be an ideal response?

Computer Science & Information Technology

__________ is used to encode real numbers to store them in the computer's memory.

a. Floating-point notation b. Unicode c. Assembly language d. RAM

Computer Science & Information Technology