Get the information you need with the help of IDNLearn.com's extensive Q&A platform. Join our community to receive prompt and reliable responses to your questions from knowledgeable professionals.

Dahlia has just been hired as a new cybersecurity manager at an organization. Up until now, the organization has not had any formal procedures in place to handle events such as malware or data breaches. Dahlia would like to ensure that everyone follows the same procedures when responding to these events. Which of the following should she create?
a. IRP
b. DRP
c. IP
d. CDP