Deploying compensating security controls is an example of:
A. Risk avoidance
B. Risk mitigation
C. Risk transference
D. Risk acceptance
Answer: B. Risk mitigation
Computer Science & Information Technology
You might also like to view...
The number of time intervals between two dates is calculated using the built-in ____ function.
A. Date B. DateDiff C. Time D. CalcDate
Computer Science & Information Technology
Spreadsheet software typically has special data-handling features that allow you to manipulate the rows and columns of a worksheet as if they were ____ and fields in a database.
A. files B. records C. characters D. categories
Computer Science & Information Technology
Constructing a large program from smaller components is called _______ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Another name for event logging is auditing
Indicate whether the statement is true or false
Computer Science & Information Technology