Sara, the Chief Security Officer (CSO), has had four security breaches during the past two years. Each breach has cost the company $3,000. A third party vendor has offered to repair the security hole in the system for $25,000. The breached system is scheduled to be replaced in five years. Which of the following should Sara do to address the risk?

A. Accept the risk saving $10,000.
B. Ignore the risk saving $5,000.
C. Mitigate the risk saving $10,000.
D. Transfer the risk saving $5,000.


Answer: D. Transfer the risk saving $5,000.

Computer Science & Information Technology

You might also like to view...

While you're out, you can use Facebook's mobile app to let your friends know where you are by using the ________ feature

A) Update B) Post C) Check In D) Location

Computer Science & Information Technology

Structures are easy to find and change: They have one entry point and one exit point-a clear beginning and end.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You cannot sort arrays in reverse alphabetical order.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Cameron needs to insert a citation, but he does not have the source information. Which of the following should he do

A) Add a new citation placeholder. B) Insert a footnote. C) Insert an endnote. D) Add an existing citation.

Computer Science & Information Technology