Alex is the network administrator for an organization. He decides to implement a new firewall on the company's broadband Internet connection to prevent hackers from entering the network. What risk management technique is Alex practicing?

a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance


Answer: a. Risk mitigation

Computer Science & Information Technology

You might also like to view...

List and describe the utilities of information systems that can be used to evaluate the information system.

What will be an ideal response?

Computer Science & Information Technology

What are the differences between a standard USB flash drive and one protected with hardware encryption?

What will be an ideal response?

Computer Science & Information Technology

If you have a reference that is very long and would require a lot of space if entered as a footnote at the bottom of the page, it is best to reference in a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

If there are three classes, shape, circle, and square, what is the most likely relationship among them?

A. The square class is a base class, and shape and circle are derived classes of square. B. The shape class is a base class, and circle and square are derived classes of shape. C. The shape, circle, and square classes are all sibling classes. D. These three classes cannot be related.

Computer Science & Information Technology