In the context of incident handling phases, which two activities fall under scoping? (Choose two.) A. determining the number of attackers that are associated with a security incident B. ascertaining the number and types of vulnerabilities on your network C.…