What type of risk management strategy is being employed when an organization installs two firewalls to provide protection from unauthorized access to the network?
A . Diversifying the risk that network access will not be available to legitimate, authorized users.
B . Accepting the risk that there may be attempts at unauthorized access to the network.
C . Avoiding the risk of having a direct network connection to un-trusted networks.
D . Sharing the risk that either firewall could be compromised by hackers.
Answer: A
Latest IIA-CRMA Dumps Valid Version with 283 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund