Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
alfaMegatron
3 months, 2 weeks agojohndoe69
5 months, 3 weeks agoPerseus_68
8 months, 3 weeks agomusagul
9 months ago