Which of the following is an example of a Severity Level 3 incident?

A) Malware detected on multiple systems
B) User’s excessive use of bandwidth or resources
C) Compromise or suspected compromise of any company website or web presence
D) Compromise or suspected compromise of protected customer information

B) User’s excessive use of bandwidth or resources

Computer Science & Information Technology

You might also like to view...

A foundation to tomorrow's learning, ________, uses Web 2.0 computing and communication technologies to support learning.

A) Media literacy B) Cyberlearning C) Coding D) Learning centers

Computer Science & Information Technology

When an Access object is selected, the right side of the ________ bar contains buttons for switching views

Fill in the blank(s) with correct word

Computer Science & Information Technology