A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?(A). Containment(B). Identification(C). Recovery(D). Preparation