This is an example of:

An employee finds a usb drive in the employee lunch room and plugs the drive into a shared
workstation to determine who owns the drive. When the drive is inserted, a command prompt
opens and a script begins to run. The employee notifies a technician who determines that data on
a server have been compromised. This is an example of:

An employee finds a usb drive in the employee lunch room and plugs the drive into a shared
workstation to determine who owns the drive. When the drive is inserted, a command prompt
opens and a script begins to run. The employee notifies a technician who determines that data on
a server have been compromised. This is an example of:

A.
Device removal

B.
Data disclosure

C.
Incident identification

D.
Mitigation steps

Explanation:



Leave a Reply 1

Your email address will not be published. Required fields are marked *

2 × 5 =


CompTIA is tricksy hobbitseseses!

CompTIA is tricksy hobbitseseses!

Where is “E. This company employs utter morons”?