After a security incident has been resolved, it is important to conduct a "post-mortem" evaluation of compliance-based security measures, which should include ____________. (Select ALL correct answers.)

Question 9 options:

forensic analysis of network and target systems


analysis of the sequence of events


reconfiguring all firewall and IDS/IPS settings


identifying the attacker's goal(s)


identify the name and location of the attacker