Which of the following risk-handling techniques was used?

Company A acquired Company. During an audit, a security engineer found Company B’s environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B’s infrastructure could be integrated into Company A’s security program.

Which of the following risk-handling techniques was used?
A . Accept
B . Avoid
C . Transfer
D . Mitigate

Answer: D

Explanation:

Reference: https://www.pivotpointsecurity.com/blog/risk-tolerance-in-business/

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments