A compromised workstation utilized in a Distributed Denial of Service (DDOS) attack has been removed from the network and an image of the hard drive has been created. However, the system administrator stated that the system was left unattended for several hours before the image was created. In the event of a court case, which of the following is likely to be an issue with this incident?
A. Eye Witness
B. Data Analysis of the hard drive
C. Chain of custody
D. Expert Witness
Answer: C. Chain of custody
You might also like to view...
Discuss what a budget baseline is used for.
What will be an ideal response?
Match each of the end-of-chapter materials with its feature.
A. Named after the Hawaiian word for quick. B. Users create the content. C. Responsible for retrieving the requested information from the database. D. Can be used to link to a specific article on a blog. E. Dedicated blog search engine. F. Blog directory Web site. G. Google's advertising service. H. Available to the public for free. I. Contains options for specifying basic information about a blog. J. Format useful for line art, basic screen shots, and drawings.
Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly.
Answer the following statement true (T) or false (F)
What is the installation of a new file system on a device known as? Describe this process.
What will be an ideal response?