Deploying compensating security controls is an example of:

A. Risk avoidance
B. Risk mitigation
C. Risk transference
D. Risk acceptance


Answer: B. Risk mitigation

Computer Science & Information Technology

You might also like to view...

The number of time intervals between two dates is calculated using the built-in ____ function.

A. Date B. DateDiff C. Time D. CalcDate

Computer Science & Information Technology

Spreadsheet software typically has special data-handling features that allow you to manipulate the rows and columns of a worksheet as if they were ____ and fields in a database.

A. files B. records C. characters D. categories

Computer Science & Information Technology

Constructing a large program from smaller components is called _______ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Another name for event logging is auditing

Indicate whether the statement is true or false

Computer Science & Information Technology