Utilizing external resources for highly technical information security tasks allows an information security manager to:
A. distribute technology risk.
B. leverage limited resources.
C. outsource responsibility.
D. transfer business risk.
A. distribute technology risk.
B. leverage limited resources.
C. outsource responsibility.
D. transfer business risk.