Site icon Exam4Training

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A . Safeguards
B . Preventive controls
C . Detective controls
D . Corrective controls

Answer: D

Latest CAP Dumps Valid Version with 395 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version