Answer:
Post-incident activity
Explanation:
The incident response life cycle is to preventing and mitigating from the threat. It needs an enterprise so that the organized approach block the security breaches and to improve the network defenses.
It is conducted by:
- To identify the weak point of the candidate
- To make hard the security so that the incident could not happen again.
- Safeguards should be there.
- An unsuccessful event also could be taken as an incident.
Answer:
In primaries, party members vote in a state election for the candidate they want to represent them in the general election. After the primaries and caucuses, each major party, Democrat and Republican, holds a national convention to select a Presidential nominee.
The threat to validity that is likely to occur in the scenario above is Selection Bias.
<h3>What is Selection Bias?</h3>
This occurs when a researcher has control and intentionally chooses those who are going to be researched, observed, or studied. To eliminate this bias, the scientist must ensure that the sample population is selected very randomly.
Other threats to validity are:
- History
- Maturation
- Attrition
- Social Interaction
- Instrumentation
- Testing
- Regression to the mean, etc.
Please see the link below for more about Threat to Validity:
brainly.com/question/4168290