What type of risk management strategy is being employed when an organization installs two firewalls to provide protection from unauthorized access to the network?
What type of risk management strategy is being employed when an organization installs two firewalls to provide protection from unauthorized access to the network?
A . Diversifying the risk that network access will not be available to legitimate, authorized users.
B . Accepting the risk that there may be attempts at unauthorized access to the network.
C . Avoiding the risk of having a direct network connection to un-trusted networks.
D . Sharing the risk that either firewall could be compromised by hackers.
Answer: A
Latest IIA-CRMA Dumps Valid Version with 283 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments