38. Audit trails, logs, CCTV, intrusion detection systems, antivirus software,
penetration testing, password crackers, performance monitoring, and cyclic
redundancy checks (CRCs) are examples of what?(A) Directive controls(B) Detective controls(C) Corrective controls(D) Preventive controls