You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident
in the network of your company. You develop a signature based on the characteristics of the
detected virus. Which of the following phases in the Incident handling process will utilize the
signature to resolve this incident?
A.
Eradication
B.
Identification
C.
Containment
D.
Recovery
Explanation: