The __________ control strategy attempts to shift risk to other assets, other processes, or other organizations.

A. transference
B. defense
C. acceptance
D. mitigation


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the complexity of the quick sort algorithm in the worst case scenario?

a. O(n^2) b. O(n log(n)) c. O(n) d. O(log(n))

Computer Science & Information Technology

Which of the following is the most accurate and complete definition of the cloud?

A. Computing resources available to anyone B. A bubble on a network diagram C. Easily accessible data storage D. Elastic leasing of pooled computer resources over the Internet E. Computers somewhere out there

Computer Science & Information Technology

The default value for the text area height is ____ rows.

A. 2 B. 3 C. 4 D. 5

Computer Science & Information Technology

The chip that contains software to start the computer is the ___________. Note: Use the acronym (the letters) commonly used for this part

Fill in the blank(s) with correct word

Computer Science & Information Technology