Company A acquired Company ׀’. During an audit, a security engineer found Company B's environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B's infrastructure could be integrated into Company A's security program.
Which of the following risk-handling techniques was used?
AlexJacobson
Highly Voted 2 years, 5 months agosurfuganda
Most Recent 9 months agoBiteSize
1 year, 5 months agoAlenKumar
2 years agohidady
2 years agoMr_BuCk3th34D
2 years ago