Deploying compensating security controls is an example of:
A. Risk avoidance
B. Risk mitigation
C. Risk transference
D. Risk acceptance
Answer: B. Risk mitigation
Computer Science & Information Technology
You might also like to view...
You can copy and perform an Excel If function into an Access field name exactly as it appears in the Excel spreadsheet cell
Indicate whether the statement is true or false
Computer Science & Information Technology
You can place your