________ allows a response team to determine an incident's damage potential and to gather information needed to begin containment and recovery.

A. Detection
B. Analysis
C. Both detection and analysis
D. Escilation


B. Analysis

Computer Science & Information Technology

You might also like to view...

What error will you get if there is something wrong with the formula in a calculated field?

A) #NAME! B) Invalid expression C) Invalid syntax D) #FORMULA!

Computer Science & Information Technology

The ________ command divides a window into multiple panes

Fill in the blank(s) with correct word

Computer Science & Information Technology

The primary goal of system hacking is to authenticate to the remote host with the highest level of access

Indicate whether the statement is true or false.

Computer Science & Information Technology

Users always follow the expected path.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology