A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody
Answer: D. Chain of custody
You might also like to view...
When using the Scanner class one should account for a/an:
(a) NumberFormatException (b) InputMismatchException (c) ArrayIndexOutOfBoundsException (d) PowerFailureException
The accompanying figure shows a join of the Business Analyst and Client tables. ____________________ joins are used to show all the records in one table as well as the common records; that is, the records that share the same value in the join field.
Fill in the blank(s) with the appropriate word(s).
The ________ button moves the video backward one frame
Fill in the blank(s) with correct word
When using the Save As box to save a template file, the Save As type ________ should be used
Fill in the blank(s) with correct word