Of the five major risk control strategies discussed in this chapter, which is the preferred strategy when it can be applied? Give some examples of techniques used in this approach.
What will be an ideal response?
The defense approach attempts to prevent the exploitation of a vulnerability. This is the preferred approach and is accomplished by means of countering threats, removing vulnerabilities in assets, limiting access to assets, and adding protective safeguards.
You might also like to view...
______ is leveling the concrete evenly to the top of the forms.
A. Floating B. Edging C. Screeding D. Grooving
How can a technician float themselves and safely remove the risk for shock from the hot line?
Fill in the blank(s) with the appropriate word(s).
The basic measure of the amount of light produced by a light source is called the _____.
a. incandescence b. candlepower c. footcandle d. lumen
On a ________ brake, each brake shoe is applied individually
A) Non-servo B) Triple-servo C) Dual-servo D) Single-servo