Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident

Which of the following techniques are used after a security breach and are intended to limit the
extent of any damage caused by the incident

Which of the following techniques are used after a security breach and are intended to limit the
extent of any damage caused by the incident

A.
Corrective controls

B.
Safeguards

C.
Detective controls

D.
Preventive controls



Leave a Reply 0

Your email address will not be published. Required fields are marked *