A company recently experienced a security incident in which its domain controllers were the target of a DoS attack.
In which of the following steps should technicians connect domain controllers to the network and begin authenticating users again?
A . Preparation
B . Identification
C . Containment
D . Eradication
E . Recovery
F . Lessons learned
Answer: E