Multiple Choice
You have a small business that has had problems with malware on your employees' computers. You decide to hire a third-party company such as GFI Software to implement security controls and then monitor your company's systems. You are adopting a risk ________ strategy.
A) acceptance
B) analysis
C) limitation
D) transference
Correct Answer:

Verified
Correct Answer:
Verified
Q41: Which hacker group successfully attacked Sony Picture
Q42: _ is the loss of business from
Q43: A copyright lasts 20 years.
Q44: By hiring FireEye to improve their security,
Q45: Identity theft is a deliberate threat to
Q47: The airport's self check-in computers are a(n)_
Q48: _ is a process whereby the organization
Q49: Phishing is an example of _.<br>A)Copyright infringement<br>B)Espionage<br>C)Sabotage<br>D)Software
Q50: SCADA attacks typically occur on _.<br>A)Hacker networks<br>B)Industrial
Q51: Which of the following is NOT one