Deploying compensating security controls is an example of:

A. Risk avoidance
B. Risk mitigation
C. Risk transference
D. Risk acceptance

Answer: B. Risk mitigation

Computer Science & Information Technology

You might also like to view...

You can copy and perform an Excel If function into an Access field name exactly as it appears in the Excel spreadsheet cell

Indicate whether the statement is true or false

Computer Science & Information Technology

You can place your