During the ________ phase of an incident response, the focus would be on the precise recognition of the actual security incident.
a. Encryption
b. Identify
c. Incident response
d. Remote