Which of the following activities is included in the post-incident review phase?
Determining the root cause of the incident
Developing steps to mitigate the risks of the incident
Validating the accuracy of the evidence collected during the investigation
Reestablishing the compromised system's configuration and settings
Submit