Deploying compensating security controls is an example of:
A.
Risk avoidance
B.
Risk mitigation
C.
Risk transference
D.
Risk acceptance
Deploying compensating security controls is an example of:
Deploying compensating security controls is an example of:
A.
Risk avoidance
B.
Risk mitigation
C.
Risk transference
D.
Risk acceptance