List of questions
Related questions
Question 186 - CISSP-ISSEP discussion
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident
A.
Corrective controls
B.
Safeguards
C.
Detective controls
D.
Preventive controls
Your answer:
0 comments
Sorted by
Leave a comment first