Answer:
The answer is "Option D".
Step-by-step explanation:
It refers to an attacker gains remote access to protected networks and information from an organization. This protocol is an earlier than usual-stage breach, which can be a result of these issues as device damage and data loss, and wrong choices can be described as follows:
- In option A, It may be assumed to have a significant negative impact on corporate processes, institutional assets, or staff.
- In option B, It may be assumed, that loss would have a significant adverse impact on organizational activities, corporate assets, or employees.
- In option C, It may be assumed to always have minimal detrimental effects on institutional, or personal activities.