An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:
A. transfer
B. acceptance
C. mitigation
D. avoidance
A. transfer
B. acceptance
C. mitigation
D. avoidance