Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
A) Safeguards
B) Preventive controls
C) Detective controls
D) Corrective controls
Correct Answer:
Verified
Q265: You are the project manager of the
Q266: You work as a project manager for
Q267: Which of the following requires all general
Q268: Certification and Accreditation (C&A or CnA) is
Q269: Information risk management (IRM) is the process
Q271: You are the project manager of the
Q272: You are the project manager of the
Q273: Rob is the project manager of the
Q274: Which of the following NIST Special Publication
Q275: Where can a project manager find risk-rating
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents