Security MCQ
Network Security
Which risk management response is being implemented when a company decides to close a little-used legacy web application identified as vulnerable to SQL Injection?
Which risk management response is being implemented when a company decides to close a little-used legacy web application identified as vulnerable to SQL Injection?
Which risk management response is being implemented when a company decides to close a little-used legacy web application identified as vulnerable to SQL Injection?
a. Acceptance
b. Avoidance
c. Mitigation
d. Transference
Answer: B
Learn More :