When determining the scope of a cybersecurity incident, which of the following factors is the most critical to include to ensure a thorough incident response report?
Listing all potential vulnerabilities
Documenting the suspected source of the attack
Calculating the total data exfiltrated
Identifying affected systems