An employee finds a usb drive in the employee lunch room and plugs the drive into a shared workstation to determine who owns the drive. When the drive is
inserted, a command prompt opens and a script begins to run. The employee notifies a technician who determines that data on a server have been compromised.
This is an example of:

A.
Device removal
B.
Data disclosure
C.
Incident identification
D.
Mitigation steps