Respuesta :

This is a systematic and documented method of approaching and managing situations resulting from IT security incidents or breaches.

Answer:

critical actions that are taken in the first few minutes of an emergency

Explanation: