A security breach has been discovered. You have identified where the breach occurred. What is the next step in this investigation?
A. Preservation
B. Collection
C. Examination
D. Identification
A
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
You might also like to view...
We saw the CDialog class as an example of a graphical user interface control that is designed to be used as a parent/base class. Can you find two more GUI classes designed with the same intention? (Note, many GUI controls are used as is, such as a slider or a button. This question is asking for a control that you modify for your program’s use.)
What will be an ideal response?
HTML ________ whitespace.
Fill in the blank(s) with the appropriate word(s).
In the hierarchy chart, files are closed:
a. In the Initialization Section b. In the Process Section c. In the Termination Section. d. Wherever you want. e. None of the above.
For each function, f(), g() and h() state how what exceptions should be thrown.
Given these three functions with different exception specifications a) void f()throw(); b) void g()throw(int, string); c) void h();