Watch this video on YouTube
Which of the following is an example of a corrective control in a cybersecurity context?