When is it appropriate to contact law enforcement when an organization experiences a security breach?

A. If a violation is more severe than just breaking company policy rules
B. If a breach of security occurs
C. If a tolerable or accepted risk is realized
D. If an insider uses another employee's credentials

Answer: A. If a violation is more severe than just breaking company policy rules

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about viruses and worms?

A) Viruses are commonly spread through e-mail attachments, but they can also infect your computer when you download files or programs from the Internet. B) Once your computer is infected with a virus, the virus can attach itself to a program or file to spread to other users. C) Worms cannot carry viruses. D) Computer viruses are malicious programs installed on your computer without your knowledge and are programmed to destroy or damage data on your computer.

Computer Science & Information Technology

Consider a transaction that transfers funds between two bank accounts. It can be structured into two subtransactions: one to debit the first account and the second to credit the second account. Describe howthis can be done in (a) the hierarchical model and (b) the peer model.

What will be an ideal response?

Computer Science & Information Technology