Following a security failure incident, the chain of custody must be followed in order to:
A. Determine who accessed the compromised equipment pre-incident.
B. Securely lock down any compromised equipment.
C. Preserve and maintain evidence integrity.
D. Provide an accurate timeline detailing how the incident occurred.
Ans: C. Preserve and maintain evidence integrity.
You might also like to view...
If you position the pointer outside of an image until it changes to a curved arrow and then drag in the direction you want to rotate the image, this is called a free ____________________ rotation.
Fill in the blank(s) with the appropriate word(s).
In what way can assigning moral blame for software failures be difficult?
What will be an ideal response?
What network technology would use a non-line-of-sight tower?
A) 802.16 B) Wireless hotspot C) QoS D) PSTN
Goal Seek is a program that searches for the optimal solution of a problem involving several variables. _________________________
Answer the following statement true (T) or false (F)