Question 49:
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Answer options:
A. Safeguards B. Preventive controls C. Detective controls D. Corrective controls