An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation to determine who owns the drive. When the drive is inserted, a command prompt opens and a script begins to run. The employee notifies a technician who determines that data on a server have been compromised. This is an example of:
A. Device removal
B. Data disclosure
C. Incident identification
D. Mitigation steps
Answer: C. Incident identification
Computer Science & Information Technology
You might also like to view...
The facts that a function assumes to be true of the arguments that it receives are called __________.
a. function input validations b. local variables c. postconditions d. preconditions e. none of the above
Computer Science & Information Technology
If you position the insertion point in text that has a CSS rule applied to it, that rule is displayed in the _______________ text box in the HTML Property inspector.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology