Why might a company allow an attacker to continue working in the system for a brief period of time?

A. In order to prove the information security manager is not doing a good job.
B. In order to test their IT systems.
C. In order to give he attacker an opportunity to steal some data.
D. In order to collect data on what the attacker is doing in order to collect evidence for prosecution.


D. In order to collect data on what the attacker is doing in order to collect evidence for prosecution.

Computer Science & Information Technology

You might also like to view...

Draw a weight over someone in a picture.

What will be an ideal response?

Computer Science & Information Technology

The process of adjusting the level of a number of tracks to bring them all up to about the same level is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you see a zero (0) in a routing table, it means _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A prefix of ____ is used to denote a variable defined as a Char data type.

A. str B. chr C. txt D. wrd

Computer Science & Information Technology