An organization experienced a data breach compromising customer data. Following the incident, the security team implemented measures to restore affected systems and reduce the impact of the breach. Which of the following actions is an example of a corrective control?
Displaying warning banners on login screens to deter unauthorized access.
Implementing stronger network firewalls to prevent future breaches.
Conducting a forensic analysis to determine how the breach occurred.
Restoring data from backups and applying patches to affected systems.