ISC Exam Questions

Which of the following techniques are used after a security breach and are intended to limit the ext

Which of the following techniques are used after a security breach and are intended to limit
the extent of any damage caused by the incident?

A.
Safeguards

B.
Preventive controls

C.
Detective controls

D.
Corrective controls