An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation to determine who owns the drive. When the drive is inserted, a command prompt opens and a script begins to run. The employee notifies a technician who determines that data on a server have been compromised. This is an example of:

A. Device removal
B. Data disclosure
C. Incident identification
D. Mitigation steps


Answer: C. Incident identification

Computer Science & Information Technology

You might also like to view...

?Read the following sentence and key the correct terminal punctuation mark in the blank.How does the defibrillator work _____

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The voice-oriented dial-up telephone network was originally a(n) ____ medium.

A. digital B. electrical C. analog D. mechanical

Computer Science & Information Technology

An important usability issue is helping users recover from __________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The higher a processor's speed, the better the overall performance of the computer. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology