(ISC)2(ISC)2
CISSP-ISSEP · Question #150
CISSP-ISSEP Question #150: Real Exam Question with Answer & Explanation
Sign in or unlock CISSP-ISSEP to reveal the answer and full explanation for question #150. The question stem and answer options stay visible for context.
Security Operations
Question
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Options
- ACorrective controls
- BSafeguards
- CDetective controls
- DPreventive controls
Unlock CISSP-ISSEP to see the answer
You've previewed enough free CISSP-ISSEP questions. Unlock CISSP-ISSEP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Security controls#Corrective controls#Incident response#Damage limitation