Which of the following is an example of a Severity Level 1 incident?

A) Inappropriate access to legally protected or proprietary information
B) Malware detected on multiple systems
C) User access to content or sites restricted by policy
D) Any act that is in direct violation of local, state, or federal law or regulation


D) Any act that is in direct violation of local, state, or federal law or regulation

Computer Science & Information Technology

You might also like to view...

What is meant when you are told to build and test your software in steps?

What will be an ideal response?

Computer Science & Information Technology

____________________ are placeholders for which to bind user input.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance.

A. 802.11a B. 802.11b C. 802.11cn D. 802.11ac

Computer Science & Information Technology

The original definition of ____ is a software security vulnerability in Web applications that can be used by an attacker to compromise the same origin policy of client-side scripting languages.

A. denial of service B. cross-site scripting C. phishing D. SQL injection

Computer Science & Information Technology