It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts
Select one:
a. Several seconds
b. Several minutes
c. Several hours
d. Several days
e. Several months