Organizations use a(n) ________ to categorize a security threat, determine its cause, preserve any evidence, and get systems back online so they can resume business. Question 5 options: A) incidence response plan B) vulnerability assessment scheme C) risk matrix D) total quality management program