Multiple Choice
____ is the risk control strategy that attempts to prevent the exploitation of the vulnerability.
A) Acceptance
B) Transference
C) Avoidance
D) Mitigation
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q34: A(n)_ is an investigation and assessment of
Q35: <i>Match each statement with an item below.</i><br>-Segments
Q36: _ is the process of applying controls
Q37: What are some of the key elements
Q38: _ is the control approach that attempts
Q40: An information security policy provides rules for
Q41: A _ deals with the preparation for
Q42: What is the difference between transference and
Q43: _ ensures that only those with the
Q44: A _ is a document that expresses