An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation
to determine who owns the drive. When the drive is inserted, a command prompt opens and a script
begins to run. The employee notifies a technician who determines that data on a server have been
compromised. This is an example of:
A.
Device removal
B.
Data disclosure
C.
Incident identification
D.
Mitigation steps