Which of the following incident response procedures BEST allows Sara, the security technician, to identify who had possession of a hard drive prior to forensics analysis?

A. Chain of custody
B. Tracking man hours
C. Witnesses
D. Capturing system images


Answer: A. Chain of custody

Computer Science & Information Technology

You might also like to view...

If a program has only one menu structure, the menu is known as a(n) __________-level menu.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Bypassing the CCB process gives the developer more time to guard against security vulnerabilities in the application.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When limiting information overload, a good rule to follow is that users should not have to click more than ____ time(s) to get to the information they desire.

A. six to eight B. two to three C. three to five D. four to six

Computer Science & Information Technology

UTP is a type of ________ used in a wired network to connect a device to the router

Fill in the blank(s) with correct word

Computer Science & Information Technology