Which of the following is not a strategy for mitigating the risk of threats against information?
A) Continue operating with no controls and absorb any damages that occur
B) Transfer the risk by purchasing insurance.
C) Implement controls that minimize the impact of the threat
D) Install controls that block the risk.
E) Installing an updated operating system.
Correct Answer:
Verified
Q46: Voice and signature recognition are examples of:
A)
Q47: _ is the process in which an
Q50: In _, the organization purchases insurance as
Q51: Which of the following statements concerning the
Q53: Which of the following statements is false?
A)
Q55: Access controls involve _ before _.
A) biometrics,
Q78: Which of the following statements concerning firewalls
Q79: Refer to IT's About Business 7.2 -
Q81: You start a new job. You want
Q82: You start a new job. You know
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents