Jim decides to purchase a business insurance policy to protect himself against liability from hacker attack. What risk management technique is Jim practicing?

a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance

Answer: c. Risk transference

Computer Science & Information Technology

You might also like to view...

With an object selected, what would Alt-clicking (Windows) or Option-clicking

(Mac OS) on a graphic style in the Graphic Styles panel do? What will be an ideal response?

Computer Science & Information Technology

What does the following command do when run on the router? no ip directed-broadcast

a. Prevents ARP poisoning b. Prevents MAC flooding c. Prevents the network from being used to bounce Smurf traffic d. Prevents exploiting programming flaws

Computer Science & Information Technology