The security analyst determined that an email containing a malicious attachment was sent to several employees within the company, and it was not stopped by any of the email filtering devices. An incident was declared. During the investigation, it was determined that most users deleted the email, but one specific user executed the attachment. Based on the details gathered, which of the following actions should the security analyst perform NEXT?A. Obtain a copy of the email with the malicious attachment. Execute the file on another user's machine and observe the behavior. Document all findings.B. Acquire a full backup of the affected machine. Reimage the machine and then restore from the full backup.C. Take the affected machine off the network. Review local event logs looking for activity and processes related to unknown or unauthorized software.D. Take possession of the machine. Apply the latest OS updates and firmware. Discuss the problem with the user and return the machine.