A security team uses the NIST Incident Response Lifecycle to support incident response operations. How should they follow the steps to use the approach most effectively?
A) Only use each step once.
B) Skip irrelevant steps.
C) Complete the steps in any order.
D) Overlap the steps as needed.