Which of the following is NOT an alternative to using CBA to justify risk controls?

A. benchmarking
B. due care and due diligence
C. selective risk avoidance
D. the gold standard


Answer: C

Computer Science & Information Technology

You might also like to view...

Effects include arrows, circles, cones, and stars.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____________________ occurs when someone steals personal or confidential information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which button applies highlighting to selected text?

A. Font Color B. Change Case C. Bold D. Text Highlight Color

Computer Science & Information Technology

When you copy data from RAM into a file on a storage device, you read to the file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology