Not convinced it's only D since strong authentication also helps protect sensitive info. Could see broken authentication (C) as a trap here.
Its B for sure since the key thing is the software looked legit but was actually hiding something malicious. If the question asked for how the attacker gains access (like remote control vs just stealing info), would that change the answer to A instead?
Yeah B looks right, matches the recommended order in the official courseware. Start by identifying what evidence you need (3) and where it comes from (4), then set policies before getting into training or documentation. I've seen this structure in EC-Council study guides and a couple of practice tests. If anyone has a different official resource showing another sequence, let us know!
Just confirming, does "inappropriate usage" specifically mean violations of acceptable use policies, or could it include internal attacks like B? If the criteria are just policy violations, I'd probably switch my pick.