A business is upgrading its network infrastructure to accommodate a personnel growth of over 50% within the next six months. All preliminary planning has been completed, and a risk assessment plan is being adopted to decide which security controls to put in place throughout each phase. As part of this project, upper management is negotiating an SLA with a third party. Which of the following risk

responses is being used?

A. avoidance
B. mitigation
C. acceptance
D. transference

D
Explanation: When upper management is negotiating an SLA with a third party, the organization is using a risk response of transference. At least some of the risk of the project is being transferred to the third party.
Risk avoidance occurs when a risk is avoided by terminating the activity that causes a risk or choosing an alternative that is not as risky. Risk mitigation occurs when a risk is mitigated by reducing the risk to a tolerable level. Risk acceptance occurs when a risk is allowed.

Computer Science & Information Technology

You might also like to view...

What is the purpose of the Input display setting?

A) Enables selection between ports on a video adapter that has two or more video ports B) Enables selection between the integrated video port and the video adapter port C) Enables selection between input ports on a monitor D) Enables additional ports that may be on the monitor such as USB ports

Computer Science & Information Technology

When you install a sound card, you should disable the motherboard _______

Fill in the blank(s) with correct word

Computer Science & Information Technology