A security analyst captures forensic evidence from a potentially compromised system for further investigation. The evidence is documented and securely stored toFIRST:

A. maintain the chain of custody.
B. preserve the data.
C. obtain a legal hold.
D. recover data at a later time.


Answer: B. preserve the data.

Computer Science & Information Technology

You might also like to view...

Flow control statements cannot be used for parallel execution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What e-reader technology makes a screen that is easy to read and extends battery life?

a.Backlight b.E-ink c.HD d.LCD

Computer Science & Information Technology

Pressing the _________________________ button when a word is highlighted on the Spelling pane causes PowerPoint to flag that word again if it appears later in the document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Each 64-kbps channel in a DS1 signal is a(n) _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology