Your company is covered under a liability insurance policy, which provides various liability
coverage for information security risks, including any physical damage of assets, hacking attacks,
etc. Which of the following risk management techniques is your company using?
A.
Risk mitigation
B.
Risk transfer
C.
Risk acceptance
D.
Risk avoidance