The __________________ contained in the containment, eradication, and recovery phases are designed to limit the damage caused by an ongoing security incident.
a. procedures
b. techniques
c. strategies
d. protocols