Which of the following is not a strategy for mitigating the risk of threats against information?
A) Continue operating with no controls and absorb any damages that occur
B) Transfer the risk by purchasing insurance.
C) Implement controls that minimize the impact of the threat
D) Install controls that block the risk.
E) All of the above are strategies for mitigating risk.
Correct Answer:
Verified
Q40: The cost of a stolen laptop includes
Q41: Bob is using public key encryption to
Q42: _ controls are concerned with user identification,
Q43: In _, the organization takes concrete actions
Q44: Which of the following is(are) designed to
Q46: Voice and signature recognition are examples of:
A)
Q47: _ is the process in which an
Q48: Which of the following is not a
Q49: The term _ refers to clandestine software
Q50: In _, the organization purchases insurance as
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents