A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT?
A. Secure the area
B. Initiate Data collection
C. Create the forensics report
D. Verify the chain of custody
Ans: A. Secure the area
Computer Science & Information Technology
You might also like to view...
Select all that apply. Which of the following classes are used to play videos?
a. MediaView b. Media c. MediaPlayer d. VideoPlayer
Computer Science & Information Technology
____________________ cascade through the media types in the same way they cascade through a document tree.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
All writing styles require a ________ indent for a bibliography or works cited page
A) left B) first line C) right D) hanging
Computer Science & Information Technology
What types of authentication do you use when you withdraw cash from an automated teller machine (ATM)?
a. Type 1 and Type 2 b. Type 1 and Type 3 c. Type 1 d. Type 2
Computer Science & Information Technology