The CEO of a corporation purchases the latest mobile device and connects it to the internal network. The CEO then downloads sensitive financial documents through his email. The device is then lost in transit to a conference. The CEO notifies the company helpdesk about the lost device. A replacement device is shipped out. Then, the helpdesk ticket is closed stating the issue was resolved. A week

later, you realize that the original mobile device was never retrieved nor was a remote wipe on the device completed. You then complete a remote wipe of the lost device. You then report to management that this data breach was not properly reported due to insufficient training. Which process is responsible for this process?

A. eDiscovery
B. incident response
C. data recovery and storage
D. data handling


B
Explanation: The incident response process is responsible for any data breaches. A properly designed incident response process will ensure that any incidents are handled properly.
None of the other processes is responsible for security incidents.

Computer Science & Information Technology

You might also like to view...

Which of the following statements are true?

a. A Node can fire an ActionEvent. b. A Noden can fire a MouseEvent. c. A Node can fire a KeyEvent. d. A Scene can fire a MouseEvent.

Computer Science & Information Technology

The ________ function can be used to prevent the display of error codes in a cell

Fill in the blank(s) with correct word

Computer Science & Information Technology

The CancelButton property of the Windows Form object allows you to specify which button is activated when the CTRL key on the keyboard is pressed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The command used to create an index is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology