Which of the following procedures is designed to enable security personnel to identify, mitigate,
and recover from malicious computer incidents, such as unauthorized access to a system or data,
denial-of-service attacks, or unauthorized changes to system hardware, software, or data?
A.
Cyber Incident Response Plan
B.
Crisis Communication Plan
C.
Occupant Emergency Plan
D.
Disaster Recovery Plan
Explanation: