Which of the following is BEST described by a scenario where management chooses not to implement a security control for a given risk?

A. Mitigation
B. Avoidance
C. Acceptance
D. Transference


Answer: C. Acceptance

Computer Science & Information Technology

You might also like to view...

If a base class has public member functions that are not listed by a derived class, then these functions

a. are not available to the derived class b. are inherited unchanged in the derived class c. are private to the derived class d. do not exist in the derived class

Computer Science & Information Technology

All web-based word processing applications are as fully featured as installed versions

Indicate whether the statement is true or false

Computer Science & Information Technology

The speed of the system clock has a significant effect on peripheral devices such as a printer or disk drive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If an input mask is used, data will not be restricted during entry.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology