Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A . Safeguards
B . Preventive controls
C . Detective controls
D . Corrective controls
Answer: D
Latest CAP Dumps Valid Version with 395 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments