Richard is responsible for evaluating whether his company should develop and host a Web site on the corporate network. He decides that the risk posed to the site by hackers overwhelms the benefit that would be gained from having the site and decides not to develop the site. What risk management technique is Richard practicing?

a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance


Answer: b. Risk avoidance

Computer Science & Information Technology

You might also like to view...

A UPS connects your computer and a power source.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the path to the Field Headers button?

A. (PIVOTTABLE TOOLS DESIGN tab | Show group) B. (PIVOTTABLE TOOLS LAYOUT tab | Show group) C. (PIVOTTABLE TOOLS ANALYZE tab | Show group) D. (PIVOTTABLE TOOLS DESIGN tab | Fields group)

Computer Science & Information Technology

A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network.

A) firewall B) ACL C) matrix D) guard

Computer Science & Information Technology

How do you close a panel?

What will be an ideal response?

Computer Science & Information Technology