Jim decides to purchase a business insurance policy to protect himself against liability from hacker attack. What risk management technique is Jim practicing?

a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance


Answer: c. Risk transference

Computer Science & Information Technology

You might also like to view...

________ printers create an image by heating specially coated heat-sensitive paper that changes color where the heat is applied

A) Inkjet B) Thermal C) Laser D) Dye-sublimation

Computer Science & Information Technology

Dynamic binding determines which function should be called at runtime, based on the ____ type making the call.

a. object b. class c. function d. operator

Computer Science & Information Technology

When an application is run, the method that must be executed first must be named ____.

A. first() B. void() C. main() D. final()

Computer Science & Information Technology

Consider the statement: int anInt = Integer.parseInt("649"); You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.

A. programmer-defined B. instance C. static D. immutable

Computer Science & Information Technology