A security breach has been discovered, and you are responsible for performing the forensic investigation into the breach. What is the first step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification


D

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

Stage method show displays the ________.

a. Stage window b. scene graph c. root node d. title bar

Computer Science & Information Technology

The Analytical Engine was developed by ________

A) Alan Turing B) Charles Babbage C) Ada Lovelace D) Joseph Marie Jacquard

Computer Science & Information Technology

________ view displays tasks, task durations, and task dependencies and is the default view in Project 2013

A) Backstage B) Network Diagram C) Gantt Chart D) Calendar

Computer Science & Information Technology

________ is a load-balancing mechanism used by DNS servers to distribute name resolution activity among all available DNS servers

a. Clustering b. Dividing c. Round robin d. None of the above.

Computer Science & Information Technology