________ will enable an organization to determine whether it is under systematic attack or whether an incident is isolated. A. Centralized reporting B. Encryption C. Training personnel D. Quickly responding to an attack E. Practicing response to an attack