When an alert warns of new malicious code that targets software used by an organization, the first response should be to research the new virus to determine whether it is ____. Select one: a. aggressive b. real c. intrusive d. authorized