Not convinced it's only D since strong authentication also helps protect sensitive info. Could see broken authentication (C) as a trap here.
Guessing A is correct, since a malware incident spreading company-wide and triggering a mandatory 1 hour reporting window lines up with CAT 1 (highest urgency). D gets people because not every malware counts as critical, but here the scale and urgency make it fit CAT 1. Seen similar category traps in ECIH practice, so watch for that wording. Anyone disagree?
Its B for sure since the key thing is the software looked legit but was actually hiding something malicious. If the question asked for how the attacker gains access (like remote control vs just stealing info), would that change the answer to A instead?
Yeah B looks right, matches the recommended order in the official courseware. Start by identifying what evidence you need (3) and where it comes from (4), then set policies before getting into training or documentation. I've seen this structure in EC-Council study guides and a couple of practice tests. If anyone has a different official resource showing another sequence, let us know!
Just confirming, does "inappropriate usage" specifically mean violations of acceptable use policies, or could it include internal attacks like B? If the criteria are just policy violations, I'd probably switch my pick.