The _________ controls focus on the response to a security breach, by warning of violations or attempted violations of security policies or the identified exploit of a vulnerability and by providing means to restore the resulting lost computing resources.

Fill in the blank(s) with the appropriate word(s).

detection and recovery

Computer Science & Information Technology

You might also like to view...

The VBA debugger allows the programmer to perform all of the following tasks EXCEPT:

A) Continue execution of the code. B) Halt execution of the code. C) Delete each line of code. D) Enter VBA code in the Immediate window to view the results.

Computer Science & Information Technology

What is a "watched folder"?

What will be an ideal response?

Computer Science & Information Technology