Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?
A. Preventive control
B. Deterrent control
C. Corrective control
D. Detective control
A. Preventive control
B. Deterrent control
C. Corrective control
D. Detective control