A security breach has been discovered. You have identified where the breach occurred. What is the next step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification


A

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

We saw the CDialog class as an example of a graphical user interface control that is designed to be used as a parent/base class. Can you find two more GUI classes designed with the same intention? (Note, many GUI controls are used as is, such as a slider or a button. This question is asking for a control that you modify for your program’s use.)

What will be an ideal response?

Computer Science & Information Technology

HTML ________ whitespace.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the hierarchy chart, files are closed:

a. In the Initialization Section b. In the Process Section c. In the Termination Section. d. Wherever you want. e. None of the above.

Computer Science & Information Technology

For each function, f(), g() and h() state how what exceptions should be thrown.

Given these three functions with different exception specifications a) void f()throw(); b) void g()throw(int, string); c) void h();

Computer Science & Information Technology