Company A acquired Company ׀’. During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program.
Which of the following risk-handling techniques was used?
AlexJacobson
Highly Voted 2 years, 3 months agosurfuganda
Most Recent 7 months agoBiteSize
1 year, 3 months agoAlenKumar
1 year, 10 months agohidady
1 year, 10 months agoMr_BuCk3th34D
1 year, 10 months ago