After a security incident that involved data exfiltration, which type of documentation should be generated to summarize the event's details, impact, methods of detection, response actions, and recommendations for future prevention?
Incident Report
User Activity Log
Network Topology Diagram
Service Level Agreement (SLA)
Change Management Log
Asset Inventory Report