A. eliminate all vulnerabiliti… GREGORY EVANS 14 years ago A. eliminate all vulnerabilities if possible B. determine the best way transfer risk