A. eliminate all vulnerabiliti… GREGORY EVANS 15 years ago A. eliminate all vulnerabilities if possible B. determine the best way transfer risk