Which of the following is an example of a Severity Level 3 incident?
A) Malware detected on multiple systems
B) User’s excessive use of bandwidth or resources
C) Compromise or suspected compromise of any company website or web presence
D) Compromise or suspected compromise of protected customer information
B) User’s excessive use of bandwidth or resources
Computer Science & Information Technology
You might also like to view...
A foundation to tomorrow's learning, ________, uses Web 2.0 computing and communication technologies to support learning.
A) Media literacy B) Cyberlearning C) Coding D) Learning centers
Computer Science & Information Technology
When an Access object is selected, the right side of the ________ bar contains buttons for switching views
Fill in the blank(s) with correct word
Computer Science & Information Technology