GIAC Information Security Fundamentals GISF Question # 68 Topic 7 Discussion

GIAC Information Security Fundamentals GISF Question # 68 Topic 7 Discussion

GISF Exam Topic 7 Question 68 Discussion:
Question #: 68
Topic #: 7

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?


A.

Corrective controls


B.

Detective controls


C.

Safeguards


D.

Preventive controls


Get Premium GISF Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.