A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. Then you collected the evidence needed. What is the next step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification


C

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

Which of the following is true about the height of a node?

a. The height of a node is one less than the height of its parent b. The height of an empty tree is 0 c. The height of a leaf is 0 d. The height of a tree can be larger than its depth e. all of the above are false

Computer Science & Information Technology

The use of an Outer Join occurs when one table's data is more important than that of another table

Indicate whether the statement is true or false

Computer Science & Information Technology

To convert a 2007 Access database to an older format, you could use the Office Button to display the ________ menu

Fill in the blank(s) with correct word

Computer Science & Information Technology

A while loop can be used to code both definite and indefinite loops.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology