Certified Authorization Professional – CAP – Question150

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

A.
Safeguards
B. Preventive controls
C. Detective controls
D. Corrective controls

Correct Answer: D