Following a security failure incident, the chain of custody must be followed in order to:

A. Determine who accessed the compromised equipment pre-incident.
B. Securely lock down any compromised equipment.
C. Preserve and maintain evidence integrity.
D. Provide an accurate timeline detailing how the incident occurred.


Ans: C. Preserve and maintain evidence integrity.

Computer Science & Information Technology

You might also like to view...

If you position the pointer outside of an image until it changes to a curved arrow and then drag in the direction you want to rotate the image, this is called a free ____________________ rotation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In what way can assigning moral blame for software failures be difficult?

What will be an ideal response?

Computer Science & Information Technology

What network technology would use a non-line-of-sight tower?

A) 802.16 B) Wireless hotspot C) QoS D) PSTN

Computer Science & Information Technology

Goal Seek is a program that searches for the optimal solution of a problem involving several variables. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology