Jim decides to purchase a business insurance policy to protect himself against liability from hacker attack. What risk management technique is Jim practicing?
a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance
Answer: c. Risk transference
Computer Science & Information Technology
You might also like to view...
With an object selected, what would Alt-clicking (Windows) or Option-clicking
(Mac OS) on a graphic style in the Graphic Styles panel do? What will be an ideal response?
Computer Science & Information Technology
What does the following command do when run on the router? no ip directed-broadcast
a. Prevents ARP poisoning b. Prevents MAC flooding c. Prevents the network from being used to bounce Smurf traffic d. Prevents exploiting programming flaws
Computer Science & Information Technology