Which of the following is NOT an option when dealing with risk?

A. accept the risk
B. exploit the risk
C. diminish the risk
D. transfer the risk


Answer: B

Computer Science & Information Technology

You might also like to view...

Provide the command that configures a Linux PC as an IP router.

What will be an ideal response?

Computer Science & Information Technology

Linux uses files to represent ________.

a) named sets of data b) hardware devices c) shared memory regions d) all of the above

Computer Science & Information Technology

In SharePoint, a Tree view provides hierarchical navigation similar to a Folders list in File Explorer

Indicate whether the statement is true or false

Computer Science & Information Technology

Define the Live Preview feature.

What will be an ideal response?

Computer Science & Information Technology