When analyzing an incident, you must try to determine which of the following?
A. The tool used to attack
B. The vulnerability that was exploited
C. The result of the attack
D. All of the above