Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 Exam ISSEP Topic 1 Question 69 Discussion

Actual exam question for ISC2's Information Systems Security Engineering Professional exam
Question #: 69
Topic #: 1
[All Information Systems Security Engineering Professional Questions]

Which of the following techniques are used after a security breach and are intended to limit the

extent of any damage caused by the incident?

Show Suggested Answer Hide Answer
Suggested Answer: A

Corrective controls are used after a security breach. After security has been breached, corrective

controls are intended to limit the extent of

any damage caused by the incident, e.g. by recovering the organization to normal working status as

efficiently as possible.

Answer option D is incorrect. Before the event, preventive controls are intended to prevent an

incident from occurring, e.g. by locking out

unauthorized intruders.

Answer option C is incorrect. During the event, detective controls are intended to identify and

characterize an incident in progress, e.g. by

sounding the intruder alarm and alerting the security guards or the police.

Answer option B is incorrect. Safeguards are those controls that provide some amount of protection

to an asset.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel