A company's application is hosted at a data center. The data center provides security controls for the infrastructure. The data center provides a report identifying serval vulnerabilities regarding out of date OS patches. The company recommends the data center assumes the risk associated with the OS vulnerabilities. Which of the following concepts is being implemented?

A. Risk Transference
B. Risk Acceptance
C. Risk Avoidance
D. Risk Deterrence


Answer: A. Risk Transference

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Static table-driven scheduling is applicable to tasks that are periodic. 2) One of the more promising methods of resolving multitask scheduling conflicts for periodic tasks is rate monotonic scheduling. 3) Real-time tasks are not handled any differently than non-real-time tasks in the priority queues. 4) Linux provided a real-time scheduling capability coupled with a scheduler for non-real-time processes that made use of the traditional UNIX scheduling algorit hm. 5) In the real-time-priority class, all threads have a fixed priority that never changes andall the active threads at a given priority level are in a round-robin queue.

Computer Science & Information Technology

Part of an aesthetically pleasing and user-friendly design is creating a ____ hierarchy on the page by varying the size of text elements in relationship to their importance.

A. semantic B. visual C. contextual D. browser-based

Computer Science & Information Technology

Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with the IP address 193.145.85.202?

a. netstat -c 193.145.85.202 b. nbtscan -a 193.145.85.202 c. nbtstat -a 193.145.85.202 d. nbtstat -a \\193.145.85.202

Computer Science & Information Technology

Rasterizing type or a shape changes it into a bitmapped object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology