You are asked to investigate an alert related to an unknown device connected to the company's internal network. After completing your investigation, you follow company policies and procedures to implement preventative measures to stop the potential threat posed by the device. Which security domain is this scenario related to?
A) Security Architecture and Engineering
B) Incident Response and Handling
C) Security Operations
D) Risk Management