An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation to determine who owns the drive. When the drive is inserted, a command prompt opens and a script begins to run. The employee notifies a technician who determines that data on a server have been compromised. This is an example of:
A. Device removal
B. Data disclosure
C. Incident identification
D. Mitigation steps
Answer: C. Incident identification
Computer Science & Information Technology
You might also like to view...
?Read the following sentence and key the correct terminal punctuation mark in the blank.How does the defibrillator work _____
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The voice-oriented dial-up telephone network was originally a(n) ____ medium.
A. digital B. electrical C. analog D. mechanical
Computer Science & Information Technology
An important usability issue is helping users recover from __________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The higher a processor's speed, the better the overall performance of the computer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology