ISC2 Certified in Cybersecurity (CC) Practice Question
During risk treatment, which strategy is characterized by deploying security controls to reduce the probability or potential damage of an identified risk to an acceptable level?
The strategy described is mitigation, also known as risk modification. Mitigation involves adding or enhancing safeguards-such as encryption, access controls, or redundancy-to lower either the likelihood that a threat succeeds or the magnitude of its impact. Transference shifts the risk to a third party (for example, through insurance), acceptance means consciously deciding to take no further action, and avoidance eliminates the risky activity altogether. Only mitigation focuses on reducing likelihood or impact through controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of security controls used for risk mitigation?
Open an interactive chat with Bash
How does mitigation differ from risk avoidance?
Open an interactive chat with Bash
When should risk transference be chosen over mitigation?
Open an interactive chat with Bash
ISC2 Certified in Cybersecurity (CC)
Security Principles
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .