ExamQuestions.com

Register
Login
Certified Authorization Professional (CAP) Exam Questions

ISC

Certified Authorization Professional (CAP)

49 / 230

Question 49:

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident? 

Answer options:

A. Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls