The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.
Fill in the blank(s) with the appropriate word(s).
Detection and recovery
Computer Science & Information Technology
You might also like to view...
Select recommended usability and accessibility practices:
a. use video and sound whenever possible b. supply text descriptions of audio and video files that appear in your web pages c. never use audio and video files d. none of the above
Computer Science & Information Technology
What is a database lockout?
What will be an ideal response?
Computer Science & Information Technology