You work for a large organization. You notice that you have access to confidential information that
you should not be able to access in your position. You report this security incident to the helpdesk.
The incident cycle is initiated.
Which stage of the incident cycle follows the incident stage?

A.
Threat
B.
Damage
C.
Recovery
Explanation: