Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus.
Which of the following phases in the incident handling process will utilize the signature to resolve this incident?
alfaMegatron
11 months, 1 week agojohndoe69
1 year, 1 month agoPerseus_68
1 year, 4 months agomusagul
1 year, 4 months ago