ExamGecko
Home Home / ISC / CAP
Question list
Search
Search

List of questions

Search

Related questions











Question 150 - CAP discussion

Report
Export

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

A.
Safeguards
Answers
A.
Safeguards
B.
Preventive controls
Answers
B.
Preventive controls
C.
Detective controls
Answers
C.
Detective controls
D.
Corrective controls
Answers
D.
Corrective controls
Suggested answer: D
asked 18/09/2024
Benjamin Colart
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first