Which three post-mortem steps are critical to help prevent a network attack from reoccurring?
(Choose three.)
A.
Document the incident in a report.
B.
Collect “show” outputs after the attack.
C.
Involve law enforcement officials.
D.
Create a “lessons learned” collection.
E.
Update the security rules for edge devices.
F.
Revise the network security policy.