The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler. Which of the
following is occurring?

A.
Unannounced audit response
B.
Incident response process
C.
Business continuity planning
D.
Unified threat management
E.
Disaster recovery process
Explanation:
The Incident response policy outlines the processes that should be followed when an incident occurs. Thus,
when a CSO is contacted by a first responder and then assign a handler for the incident it is clearly the incident
response process that is put in practice.