During the management discussion,
A) the chief information officer (CIO) justifies this issue as a help desk activity,
B) covered by help desk procedures,
C) points out that intrusion detection system (IDS) logs are activated and firewall rules are monitored.