A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT?

A. Secure the area
B. Initiate Data collection
C. Create the forensics report
D. Verify the chain of custody


Ans: A. Secure the area

Computer Science & Information Technology

You might also like to view...

Select all that apply. Which of the following classes are used to play videos?

a. MediaView b. Media c. MediaPlayer d. VideoPlayer

Computer Science & Information Technology

____________________ cascade through the media types in the same way they cascade through a document tree.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All writing styles require a ________ indent for a bibliography or works cited page

A) left B) first line C) right D) hanging

Computer Science & Information Technology

What types of authentication do you use when you withdraw cash from an automated teller machine (ATM)?

a. Type 1 and Type 2 b. Type 1 and Type 3 c. Type 1 d. Type 2

Computer Science & Information Technology