ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 186 - CISSP-ISSEP discussion

Report
Export

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident

A.
Corrective controls
Answers
A.
Corrective controls
B.
Safeguards
Answers
B.
Safeguards
C.
Detective controls
Answers
C.
Detective controls
D.
Preventive controls
Answers
D.
Preventive controls
Suggested answer: A
asked 18/09/2024
MOHAMED RIAZ MOHAMED IBRAHIM
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first