Watch this video on YouTube
When properly tested, which of the following would MOST effectively support an information security manager in handling a security breach?