Pete, a security administrator, would like to implement laptop encryption to protect data. The Chief Executive Officer (CEO) believes this will be too costly to implement and decides the company will purchase an insurance policy instead. Which of the following is this an example of?

A. Risk avoidance
B. Risk deterrence
C. Risk acceptance
D. Risk transference


Answer: D. Risk transference

Computer Science & Information Technology

You might also like to view...

When you pass an array to a function, the function receives __________.

A. the length of the array B. a copy of the array C. the reference of the array D. a copy of the first element

Computer Science & Information Technology

When inserting a graphic into a worksheet, the ________ sizing handles indicate a point by which the graphic can be resized either horizontally OR vertically

Fill in the blank(s) with correct word

Computer Science & Information Technology

With Automatic spell checking, a ____, wavy underline indicates a word that might be misused.

A. blue B. green C. red D. yellow

Computer Science & Information Technology

A password is a unique combination of characters that identifies one specific user.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology