Beth evaluated the potential risk of a hacker entering a specific system and decided that it did not justify the cost of purchasing an expensive intrusion detection system. What type of risk management is Beth practicing?
a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance
Answer|: d. Risk acceptance
You might also like to view...
Which of the following are the MAIN reasons why a systems administrator would install security patches in a staging environment before the patches are applied to the production server? (Choose two.)
A. To prevent server availability issues B. To verify the appropriate patch is being installed C. To generate a new baseline hash after patching D. To allow users to test functionality E. To ensure users are trained on new functionality
This term describes the process where packets from one IP address/port number are redirected to another. This is often used to make services on one part of a network available to hosts on the opposite side.
What will be an ideal response?