After a security incident has been resolved, it is important to conduct a "post-mortem" evaluation of compliance-based security measures, which should include ____________. (Select ALL correct answers.)
Question 9 options:
forensic analysis of network and target systems
analysis of the sequence of events
reconfiguring all firewall and IDS/IPS settings
identifying the attacker's goal(s)
identify the name and location of the attacker