Answer:
Correction.
Step-by-step explanation:
The Intrusion correcting activities finalizes the fixing of the operations to a normal state and look to identify the method and the source of the intrusion so that to make sure that the same type of attack will not happen again in the future.
Hence the answer to this question is correction.