An Information Systems Security Officer (ISSO) received a report about secure shell (SSH) access to a network device and quickly reported it up the chain of command. SSH is normally prohibited since a central networking management application manages the network devices. However, the next day, the operations manager addressed the case as a false-positive and confirmed the network team's tasks with an official end date. Why did the operations manager conclude that the security event was false-positive?
A. The network team did not have an approved exemption.
B. The network team has a temporary exemption.
C. The network devices are exempt from security scans.
D. The network team has an indefinite exemption.