Which two types of controls are effective after a violation of a security policy occurs? (Choose two.)

IT Questions BankCategory: Cyber Threat ManagementWhich two types of controls are effective after a violation of a security policy occurs? (Choose two.)

Which two types of controls are effective after a violation of a security policy occurs? (Choose two.)

  • corrective
  • recovery
  • preventive
  • deterrent
  • compensative

Explanation: Organizations will implement corrective access controls after a system experiences a threat. Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.

Exam with this question: Cyber Threat Management - 5.4.2 Risk Management and Security Controls Quiz
Exam with this question: Cyber Threat Management: My Knowledge Check Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments