Which two tasks should an Incident Responder complete when recovering from an incident? (Choose two.)
A. Rejoin healthy endpoints back to the network
B. Blacklist any suspicious files found in the environment
C. Submit any suspicious files to Cynic
D. Isolate infected endpoints to a quarantine network
E. Delete threat artifacts from the environment