Which two types of controls are effective after a violation of a security policy occurs? (Choose two.)
- corrective
- recovery
- preventive
- deterrent
- compensative
Explanation: Organizations will implement corrective access controls after a system experiences a threat. Recovery security controls restore resources, functions and capabilities back to a normal state after a violation of a security policy.
Exam with this question: Cyber Threat Management - 5.4.2 Risk Management and Security Controls Quiz
Exam with this question: Cyber Threat Management: My Knowledge Check Answers
Please login or Register to submit your answer