hamachertyler hamachertyler 03-03-2021 Computers and Technology contestada 1A.) What can cause a threat to a computing system? A. Nick scans his hard drive before connecting it to his laptop. B. Julie turns off the power before shutting down all running programs. C. Steven has created backup of all his images. D. Cynthia uses a TPM. E. Monica has enabled the firewall settings on her desktop computer. 1B.) Which step can possibly increase the severity of an incident? A. separating sensitive data from non-sensitive data B. immediately spreading the news about the incident response plan C. installing new hard disks D. increasing access controls