In a network security policy, which procedure should be documented ahead of time to speed the
communication of a network attack?
A.
restoration plans for compromised systems
B.
credentials for packet capture devices
C.
Internet service provider contact information
D.
risk analysis tool credentials
E.
a method of communication and who to contact