Which of the following techniques are used after a security breach and are intended to limit the
extent of any damage caused by the incident
A.
Corrective controls
B.
Safeguards
C.
Detective controls
D.
Preventive controls
Which of the following techniques are used after a security breach and are intended to limit the
extent of any damage caused by the incident
Which of the following techniques are used after a security breach and are intended to limit the
extent of any damage caused by the incident
A.
Corrective controls
B.
Safeguards
C.
Detective controls
D.
Preventive controls