Following the order of volatility, taking hashes, and maintaining a chain of custody describes which of the following?
A. Forensics
B. Incident response
C. Business continuity
D. Disaster recovery
Answer: A. Forensics
You might also like to view...
A user program may limit user input to 'y' and 'n' by
A. telling the terminal driver to discard all other keys B. ignoring all other keys
Online pictures can be obtained from a variety of sources using a variety of methods
Indicate whether the statement is true or false
How do proxy server log files help protect the network?
What will be an ideal response?
In order for the browser to find the index_Resources folder, which of the following is true?
A. The index_Resources folder must be uploaded to the same ISP as the one hosting the website B. The SWF file code must include a link to the index_Resources folder C. The index_Resources folder, index.html file, and index.swf file must all be in the same directory D. The index.html file and the index.swf file must be in the index_Resources folder