After a risk assessment, it is determined that the cost to mitigate the risk is much greater than the benefit to be derived. The information security manager should recommend to business management that the risk be:
A. transferred.
B. treated.
C. accepted.
D. terminated.
A. transferred.
B. treated.
C. accepted.
D. terminated.