A computer security officer has investigated a possible data breach and has found it credible. The officer
notifies the data center manager and the Chief Information Security Officer (CISO). This is an example of:
 
A.
 escalation and notification.
B.
 first responder.
C.
 incident identification.
D.
 incident mitigation.
Explanation:
Escalation and notification is a response strategy that outlines a staged procedure of escalation and notification
that is to be followed in the event of a security incident. Only those in specific positions of authority or
responsibility must receive notification of the security breach.
 
                