Which of the following incident response procedures BEST allows Sara, the security technician, to identify who had possession of a hard drive prior to forensics analysis?
A. Chain of custody
B. Tracking man hours
C. Witnesses
D. Capturing system images
Answer: A. Chain of custody
You might also like to view...
If a program has only one menu structure, the menu is known as a(n) __________-level menu.
Fill in the blank(s) with the appropriate word(s).
Bypassing the CCB process gives the developer more time to guard against security vulnerabilities in the application.
Answer the following statement true (T) or false (F)
When limiting information overload, a good rule to follow is that users should not have to click more than ____ time(s) to get to the information they desire.
A. six to eight B. two to three C. three to five D. four to six
UTP is a type of ________ used in a wired network to connect a device to the router
Fill in the blank(s) with correct word