During an incident response Tabletop exercise, what activity are participants primarily engaged in?
Developing new security policies to be implemented immediately
Deploying intrusion detection systems within the network environment
Discussing hypothetical scenarios to validate and improve response procedures
Configuring network firewalls as a countermeasure
Training security personnel on the use of incident response software
Executing a full-scale live simulation of a security breach