Identifying the attacker(s) and attacking system(s) would occur in the __________________ incident response phase.
a. Preparation
b. Detection
c. Containment
d. Eradication