ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 573 - SY0-601 discussion

Report
Export

Which of the following scenarios best describes a risk reduction technique?

A.
A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches
Answers
A.
A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches
B.
A security control objective cannot be met through a technical change, so the company implements a pokey to train users on a more secure method of operation
Answers
B.
A security control objective cannot be met through a technical change, so the company implements a pokey to train users on a more secure method of operation
C.
A security control objective cannot be met through a technical change, so the company performs regular audits to determine it violations have occurred
Answers
C.
A security control objective cannot be met through a technical change, so the company performs regular audits to determine it violations have occurred
D.
A security control objective cannot be met through a technical change, so the Chief Information Officer decides to sign off on the risk.
Answers
D.
A security control objective cannot be met through a technical change, so the Chief Information Officer decides to sign off on the risk.
Suggested answer: B

Explanation:

A security control objective cannot be met through a technical change, so the company implements a policy to train users on a more secure method of operation best describes a risk reduction technique.

Risk reduction is a strategy that aims to lower the likelihood or impact of a risk by implementing controls or mitigations. For example, if a technical control is not feasible or cost-effective, a company can reduce the risk by educating users on how to avoid or handle the threat, such as using strong passwords, avoiding phishing emails, or reporting incidents.

asked 02/10/2024
David Hartnett
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first