An employee finds a USB drive in the employee lunch room and plugs the drive into a shared workstation to
determine who owns the drive. When the drive is inserted, a command prompt opens and a script begins to
run. The employee notifies a technician, who determines that data on a server have been compromised. This is
an example of:
A.
Device removal
B.
Data disclosure
C.
Incident identification
D.
Mitigation steps