A security analyst discovers a network intrusion and quickly solves the problem by closing an unused port. Which of the following should be completed?
A. Vulnerability report
B. Memorandum of agreement
C. Reverse-engineering incident report
D. Lessons learned report