Information developed during the risk management process is then used to develop ____ strategies.
A. mitigation
B. compliance
C. control
D. transference
Answer: A
Computer Science & Information Technology
You might also like to view...
Any number raised to the zero (0) power is __________.
a. 0 b. dependent on the number c. 1 d. The premise of this question is false.
Computer Science & Information Technology
In the figure above, Layer 1 is the active layer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology