In option B, the term "normal business functions" doesn't explicitly refer to information security incidents. It could encompass a variety of disruptions that may not necessarily involve security concerns. Option C, while focusing on the breach of availability, does not fully capture the breadth of information security incidents, which can also involve breaches of integrity and confidentiality. Therefore, option A is the most comprehensive as it covers any real or suspected adverse event related to the security of computer systems or networks, which inherently includes potential disruptions to business functions and breaches of information assets' confidentiality, integrity, and availability.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Gianmm99
7 months, 1 week ago