The SOC team has confirmed a potential indicator of compromise on an endpoint. The team has narrowed the executable file's type to a new trojan family. According to the NIST Computer Security Incident Handling Guide, what is the next step in handling this event?
Drag and drop the elements from the left into the correct order for incident handling on the right.
Which two elements of the incident response process are stated in NIST SP 800-61 r2? (Choose two.)