I
ISSEP Information Systems Security Engineering Professional
201 Questions
Question No. 1
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Choose the correct option from the given list.
01 / 201