Which of the following is NOT a task normally performed by a Computer Incident Response Team (CIRT)?
A. Develop an information security policy.
B. Coordinate the distribution of information pertaining to the incident to the appropriate parties.
C. Mitigate risk to the enterprise.
D. Assemble teams to investigate the potential vulnerabilities.
A. Develop an information security policy.
B. Coordinate the distribution of information pertaining to the incident to the appropriate parties.
C. Mitigate risk to the enterprise.
D. Assemble teams to investigate the potential vulnerabilities.