A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her activity. a. proactive security awareness b. security quality management c. protect and forget d. apprehend and prosecute