Which of the following is an example of a Level 3 incident?
A. Malware detected on multiple systems
B. User's excessive use of bandwidth and resources
C. Compromise of any company web site or company presence
D. Compromise or suspected compromise of protected customer information
Answer: B
Explanation: User's excessive use of resources is an example of a Level 3 incident. Malware detected on multiple systems is a Level 2 incident. Compromising company web presence and web sites and compromise of protected customer information are examples of Level 1 incident.
You might also like to view...
The Database Documenter searches a table for redundant data and suggests how to split the table into two or more related tables
Indicate whether the statement is true or false
In most Linux file systems, the file owner is identified in the ______________ of the file system
a. Dentry b. Inode c. $MFT d. Superblock e. File allocation table
Choose the sentence type of the following sentence.Rinji uses a debit card, and Nikki pays by check.?
A. ?Simple B. ?Compound C. ?Complex D. ?Compound-complex
The server that handles outgoing e-mail is called the ______________ server.
Fill in the blank(s) with the appropriate word(s).