Which of the following is a "possible" indicator of an actual incident, according to Donald Pipkin?

A. unusual consumption of computing resources
B. activities at unexpected times
C. presence of hacker tools
D. reported attacks


Answer: A

Computer Science & Information Technology

You might also like to view...

The term ____________________ comes about because perpetrators cast out bait, in the form of email messages, to thousands of potential victims in the hope that one or two will "bite" and fall for the scam.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is compressed code, in the sense of Thumb?

What will be an ideal response?

Computer Science & Information Technology

____ are the electronic version of sticky notes or annotations in the margin.

A. Comments B. Tracked changes C. Custom views D. Themes

Computer Science & Information Technology

By default, execution flows through a method’s statements ____.

A. sequentially B. selectively C. simultaneously D. repetitively

Computer Science & Information Technology