Differentiate among risk responses in cloud computing, including mitigation, acceptance, avoidance, and transfer.