Your company is covered under a liability insurance policy, which provides various liability
coverage for information security risks, including any physical damage of assets, hacking attacks,
etc. Which of the following risk management techniques is your company using?
A.
Risk acceptance
B.
Risk avoidance
C.
Risk transfer
D.
Risk mitigation