A security breach has been discovered, and you are responsible for performing the forensic investigation into the breach. What is the first step in this investigation?
A. Preservation
B. Collection
C. Examination
D. Identification
D
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
You might also like to view...
Stage method show displays the ________.
a. Stage window b. scene graph c. root node d. title bar
The Analytical Engine was developed by ________
A) Alan Turing B) Charles Babbage C) Ada Lovelace D) Joseph Marie Jacquard
________ view displays tasks, task durations, and task dependencies and is the default view in Project 2013
A) Backstage B) Network Diagram C) Gantt Chart D) Calendar
________ is a load-balancing mechanism used by DNS servers to distribute name resolution activity among all available DNS servers
a. Clustering b. Dividing c. Round robin d. None of the above.