Which of the following is MOST critical for responding effectively to security breaches?
A. Root cause analysis
B. Evidence gathering
C. Management communication
D. Counterattack techniques
A. Root cause analysis
B. Evidence gathering
C. Management communication
D. Counterattack techniques