Which one of the following is an example of risk transference?

A. Building a guard shack
B. Purchasing insurance
C. Erecting fences
D. Relocating facilities


Answer: B. Purchasing insurance

Computer Science & Information Technology

You might also like to view...

Suppose the string class defines operator== as a class member with a single string parameter. Assume that no other operator== are defined, that a constructor for string from const char * is defined, but operator const char* () is not defined. s is of type string. Which of the following is illegal?

a. s==s b. s=="junk" c. "junk"==s d. all are illegal e. all are legal

Computer Science & Information Technology

A digital ID is needed to insert an actual digital signature

Indicate whether the statement is true or false

Computer Science & Information Technology

Expression Web saves the arrangement of the ____________________ and uses it as the default the next time you start the program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The virus/worm that attempts to copy itself to C:WINDOWSFVProtect.exe is _______

a. W32/Netsky-P b. Troj/Invo-Zip c. MacDefender d. Sobig

Computer Science & Information Technology