Richard is responsible for evaluating whether his company should develop and host a Web site on the corporate network. He decides that the risk posed to the site by hackers overwhelms the benefit that would be gained from having the site and decides not to develop the site. What risk management technique is Richard practicing?

a. Risk mitigation
b. Risk avoidance
c. Risk transference
d. Risk acceptance

Answer: b. Risk avoidance

Computer Science & Information Technology

You might also like to view...

Define market value

What will be an ideal response?

Computer Science & Information Technology

ESXi supports which three iSCSI adapters? (Choose three.)

A. Software B. Protocol Endpoint C. FCoE D. Dependent Hardware E. Independent Hardware

Computer Science & Information Technology