An organization takes active countermeasures to protect its systems, such as installing firewalls. This approach is known as ________.
A) risk reduction
B) risk acceptance
C) risk rescheduling
D) risk transference
E) risk elimination
Question 2
________ is a group meeting-based process for requirements collection.
A) Joint application design
B) Computer-aided design
C) Human-computer interface
D) Reverse engineering
E) Total ownership