Posted by: Pdfprep
Post Date: November 23, 2020
The data will be hosted and managed outside of the company’s geographical location.
The number of users accessing the system will be small, and no sensitive data will be hosted in the solution.
As the security consultant of the project, which of the following should the project’s security consultant recommend as the NEXT step?
A . Develop a security exemption, as it does not meet the security policies.
B . Require the solution owner to accept the identified risks and consequences.
C . Mitigate the risk by asking the vendor to accept the in-country privacy principles.
D . Review the procurement process to determine the lessons learned.
Answer: B
Leave a Reply