Following the order of volatility, taking hashes, and maintaining a chain of custody describes which of the following?

A. Forensics
B. Incident response
C. Business continuity
D. Disaster recovery


Answer: A. Forensics

Computer Science & Information Technology

You might also like to view...

A user program may limit user input to 'y' and 'n' by

A. telling the terminal driver to discard all other keys B. ignoring all other keys

Computer Science & Information Technology

Online pictures can be obtained from a variety of sources using a variety of methods

Indicate whether the statement is true or false

Computer Science & Information Technology

How do proxy server log files help protect the network?

What will be an ideal response?

Computer Science & Information Technology

In order for the browser to find the index_Resources folder, which of the following is true?

A. The index_Resources folder must be uploaded to the same ISP as the one hosting the website B. The SWF file code must include a link to the index_Resources folder C. The index_Resources folder, index.html file, and index.swf file must all be in the same directory D. The index.html file and the index.swf file must be in the index_Resources folder

Computer Science & Information Technology