Which of the following is NOT an option when dealing with risk?
A. accept the risk
B. exploit the risk
C. diminish the risk
D. transfer the risk
Answer: B
Computer Science & Information Technology
You might also like to view...
Provide the command that configures a Linux PC as an IP router.
What will be an ideal response?
Computer Science & Information Technology
Linux uses files to represent ________.
a) named sets of data b) hardware devices c) shared memory regions d) all of the above
Computer Science & Information Technology
In SharePoint, a Tree view provides hierarchical navigation similar to a Folders list in File Explorer
Indicate whether the statement is true or false
Computer Science & Information Technology
Define the Live Preview feature.
What will be an ideal response?
Computer Science & Information Technology