A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. What is the next step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification


B

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. You can have a name spelled the same in two different namespaces with no conflict in your program. 2. You can use #define to define a name for a C++ variable.

Computer Science & Information Technology

Write a program to simulate a wireless mesh network with N nodes and M links where M > N. Each node is associated with an (x, y) coordinate on a 2-D plane. Add k LLs randomly and estimate the reduction in APL, ACC, and AND. Consider a slightly different method of link addition where k links are added between a randomly selected node and a central node in the network. The central node can be chosen as the node with the highest closeness centrality in the network. What are your observations on the APL values for these two cases?

What will be an ideal response?

Computer Science & Information Technology

The terms Monoblock and Speedlight mean the same thing. True or False?

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is the Intel Maximum degree limit for the processor?

A. 185F B. 155C C. 90F D. 32C

Computer Science & Information Technology