Register
70:58
Stop
PMP - Quality Assurance - Quality Control
Advanced
1/71
During a risk assessment for a complex software project, you identify a potential security vulnerability in a third-party component. Which of the following approaches aligns best with effective risk management practices?
a.
Document the risk in the risk register and continue with the project as planned
b.
Conduct a detailed analysis of the vulnerability and develop specific mitigation strategies
c.
Perform extensive penetration testing on the entire system to identify all possible security risks
d.
Replace the third-party component with an in-house solution to eliminate the vulnerability
Advanced