(ISC)2(ISC)2
CGRC · Question #521
CGRC Question #521: Real Exam Question with Answer & Explanation
Sign in or unlock CGRC to reveal the answer and full explanation for question #521. The question stem and answer options stay visible for context.
Selection and Approval of Framework, Security, and Privacy Controls
Question
Subsequent to a security breach, which of the following techniques are used with the intention to limit the extent of damage caused by the incident? Response:
Options
- ACorrective controls
- BSafeguards
- CPreventive controls
- DDetective controls
Unlock CGRC to see the answer
You've previewed enough free CGRC questions. Unlock CGRC for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Security controls#Corrective controls#Incident response#Damage limitation