During an incident response Tabletop exercise, what activity are participants primarily engaged in?
Discussing hypothetical scenarios to validate and improve response procedures
Configuring network firewalls as a countermeasure
Training security personnel on the use of incident response software
Developing new security policies to be implemented immediately
Executing a full-scale live simulation of a security breach
Deploying intrusion detection systems within the network environment