An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation to determine who owns the drive. When the drive is inserted, a command prompt opens and a script begins to run. The employee notifies a technician who determines that data on a server have been compromised. This is an example of:

A. Device removal
B. Data disclosure
C. Incident identification
D. Mitigation steps

Answer: C. Incident identification

Computer Science & Information Technology

You might also like to view...

The facts that a function assumes to be true of the arguments that it receives are called __________.

a. function input validations b. local variables c. postconditions d. preconditions e. none of the above

Computer Science & Information Technology

If you position the insertion point in text that has a CSS rule applied to it, that rule is displayed in the  _______________ text box in the HTML Property inspector.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology