Which of the following steps in the Computer Forensic Investigation process limits the extent and
significance of an incident to ensure that it does not spread to other systems?
A.
Containment
B.
Detection
C.
Preparation
D.
Eradication
Explanation: