Which of the following risk-handling techniques was used?
Company A acquired Company. During an audit, a security engineer found Company B’s environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B’s infrastructure could be integrated into Company A’s security program.
Which of the following risk-handling techniques was used?
A . Accept
B . Avoid
C . Transfer
D . Mitigate
Answer: D
Explanation:
Reference: https://www.pivotpointsecurity.com/blog/risk-tolerance-in-business/
Latest CAS-004 Dumps Valid Version with 128 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments