A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. Then you collected the evidence needed. What is the next step in this investigation?
A. Preservation
B. Collection
C. Examination
D. Identification
C
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
You might also like to view...
Which of the following is true about the height of a node?
a. The height of a node is one less than the height of its parent b. The height of an empty tree is 0 c. The height of a leaf is 0 d. The height of a tree can be larger than its depth e. all of the above are false
The use of an Outer Join occurs when one table's data is more important than that of another table
Indicate whether the statement is true or false
To convert a 2007 Access database to an older format, you could use the Office Button to display the ________ menu
Fill in the blank(s) with correct word
A while loop can be used to code both definite and indefinite loops.
Answer the following statement true (T) or false (F)