A computer security officer has investigated a possible data breach and has found it credible. The
officer notifies the data center manager and the Chief Information Security Officer (CISO). This is
an example of:

A.
escalation and notification.
B.
first responder.
C.
incident identification.
D.
incident mitigation.
Explanation:
Escalation and notification is a response strategy that outlines a staged procedure of escalation
and notification that is to be followed in the event of a security incident. Only those in specific
positions of authority or responsibility must receive notification of the security breach.