A security manager is preparing the training portion of an incident plan. Which of the following job roles should receive training on forensics, chain of custody, and the order of volatility?

A. System owners
B. Data custodians
C. First responders
D. Security guards


Answer: C. First responders

Computer Science & Information Technology

You might also like to view...

Consider the Web site for your college department. Not all of the users who visit the site have the same reasons that you do. Identify different groups of users who might come to the site. Hint: there are at least six different groups.

What will be an ideal response?

Computer Science & Information Technology

Given the array declaration, int a[20]; The first element is written as:

a. a[1] b. a[0] c. a d. a[20] e. a[19]

Computer Science & Information Technology

Forward and Back buttons are called ____________________ buttons.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To see the image of the cat, you must…

``` ``` a.click the dog image b. move your mouse off the dog image c. roll your mouse over the dog image d. the image of the cat is already displayed so nothing needs to be done

Computer Science & Information Technology