List of questions
Related questions
Question 150 - CAP discussion
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A.
Safeguards
B.
Preventive controls
C.
Detective controls
D.
Corrective controls
Your answer:
0 comments
Sorted by
Leave a comment first