After a risk assessment it is decided that security controls will be applied to a system to lower the likelihood of an incident occurring from a risk being exploited. Which risk management strategy is being used?

  • Acceptance

  • Mitigation

  • Transference

  • Avoidance


Your Score:
Attacks, Threats, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and Compliance
CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
  • Governance, Risk, and Compliance
    • This question is filed here