A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?

A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody


Answer: D. Chain of custody

Computer Science & Information Technology

You might also like to view...

When using the Scanner class one should account for a/an:

(a) NumberFormatException (b) InputMismatchException (c) ArrayIndexOutOfBoundsException (d) PowerFailureException

Computer Science & Information Technology

The accompanying figure shows a join of the Business Analyst and Client tables. ____________________ joins are used to show all the records in one table as well as the common records; that is, the records that share the same value in the join field.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ button moves the video backward one frame

Fill in the blank(s) with correct word

Computer Science & Information Technology

When using the Save As box to save a template file, the Save As type ________ should be used

Fill in the blank(s) with correct word

Computer Science & Information Technology