What type of risk management strategy is being employed when an organization installs two firewalls to provide protection from unauthorized access to the network?
What type of risk management strategy is being employed when an organization installs two firewalls to provide protection from unauthorized access to the network?
A . Diversifying the risk that network access will not be available to legitimate, authorized users.
B . Accepting the risk that there may be attempts at unauthorized access to the network.
C . Avoiding the risk of having a direct network connection to un-trusted networks.
D . Sharing the risk that either firewall could be compromised by hackers.
Answer: A
Latest IIA-CRMA Dumps Valid Version with 283 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments