An incident response team has determined there is a need to isolate a system that is communicating with a known malicious host on the Internet. Which of the following stakeholders should be contacted FIRST?
A. Executive management
B. System administrator
C. Key customers
D. The business owner
A. Executive management
B. System administrator
C. Key customers
D. The business owner