Which of the following is an example of a Level 3 incident?

A. Malware detected on multiple systems
B. User's excessive use of bandwidth and resources
C. Compromise of any company web site or company presence
D. Compromise or suspected compromise of protected customer information


Answer: B
Explanation: User's excessive use of resources is an example of a Level 3 incident. Malware detected on multiple systems is a Level 2 incident. Compromising company web presence and web sites and compromise of protected customer information are examples of Level 1 incident.

Computer Science & Information Technology

You might also like to view...

The Database Documenter searches a table for redundant data and suggests how to split the table into two or more related tables

Indicate whether the statement is true or false

Computer Science & Information Technology

In most Linux file systems, the file owner is identified in the ______________ of the file system

a. Dentry b. Inode c. $MFT d. Superblock e. File allocation table

Computer Science & Information Technology

Choose the sentence type of the following sentence.Rinji uses a debit card, and Nikki pays by check.?

A. ?Simple B. ?Compound C. ?Complex D. ?Compound-complex

Computer Science & Information Technology

The server that handles outgoing e-mail is called the ______________ server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology