Join us on Discord!
Which of the following is an example of a detective control in an information security environment?