Which of the following is NOT an alternative to using CBA to justify risk controls?
A. benchmarking
B. due care and due diligence
C. selective risk avoidance
D. the gold standard
Answer: C
Computer Science & Information Technology
You might also like to view...
Answer the following statements true (T) or false (F)
1. The CPU understands binary instructions. 2. A bit that is turned off is represented by the value -1. 3. The main reason to use secondary storage is to hold data for long periods of time, even when the power to the computer is turned off. 4. RAM is volatile memory which means it cannot be erased.
Computer Science & Information Technology
The function that accepts pointers to two C-strings and an integer argument that indicates how many characters to copy from the second string to the first is
a. strcpy b. strncpy c. copystring d. strintcpy e. None of these
Computer Science & Information Technology