It has been reported to you that someone has caused an information spillage on their computer. You go to the
computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in
incident handling did you just complete?
A.
Containment
B.
Eradication
C.
Recovery
D.
Discovery
A