Which of the following is one of the common ways potential attacks are often identified? (D4.2 L4.2.2)
A) The attackers contact the target prior to the attack, in order to threaten and frighten the target
B) Victims notice excessive heat coming from their systems
C) The power utility company warns customers that the grid will be down and the internet won't be accessible
D) Users report unusual systems activity/response to Help Desk or the security office