Watch this video on YouTube
After a cyber attack, a company implements a control that automatically restores system configurations to their original secure state. What type of control is the company implementing?