After a security incident involving a physical asset, which of the following should be done at the beginning?

A. Record every person who was in possession of assets, continuing post-incident.
B. Create working images of data in the following order: hard drive then RAM.
C. Back up storage devices so work can be performed on the devices immediately.
D. Write a report detailing the incident and mitigation suggestions.


Ans: A. Record every person who was in possession of assets, continuing post-incident.

Computer Science & Information Technology

You might also like to view...

All of the following are extra precautions you can take to secure a wireless network EXCEPT ________

A) create a passphrase B) turn on security protocols C) enable SSID broadcast D) change your network name (SSID)

Computer Science & Information Technology

When you repin an image, the user who originally created that pin receives ________ for your repin

A) credit B) bonus points C) a congratulations email D) extra pins

Computer Science & Information Technology

PowerPoint's ________ feature allows you to locate and open a file that has been automatically saved if your system suddenly shuts down

Fill in the blank(s) with correct word

Computer Science & Information Technology

Does the Pen tool create vector or raster lines?

What will be an ideal response?

Computer Science & Information Technology