An organization has implemented a type of security control that involves restoring system functionality and repairing the damage following a cyber attack. What type of security control does this best exemplify?
Detective
Directive
Preventive
Corrective
Deterrent
Compensating