Information developed during the risk management process is then used to develop ____ strategies.

A. mitigation
B. compliance
C. control
D. transference

Answer: A

Computer Science & Information Technology

You might also like to view...

Any number raised to the zero (0) power is __________.

a. 0 b. dependent on the number c. 1 d. The premise of this question is false.

Computer Science & Information Technology

In the figure above, Layer 1 is the active layer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology