A security incident occurs that requires a systems administrator to take an image of a user's workstation hard drive. Which of the following should be taken at the time the system image is generated and retained through the file of the investigation to assure files have not been modified since?

A. A checksum hash of the drive image or files
B. Copies of the system logs at specific intervals
C. A snapshot of the file system
D. The user's credentials and permissions


Answer: A. A checksum hash of the drive image or files

Computer Science & Information Technology

You might also like to view...

When joining tables, the _________ clause specifies the columns from each table that are com¬pared to determine which rows are merged.

a. ON b. WHERE c. LIKE d. GROUP

Computer Science & Information Technology

A(n) ________ arranges elements in an XTHML table containing rows with a specified number of columns.

a. h:panelGrid. b. h:table. c. h:grid. d. None of the above.

Computer Science & Information Technology

The ____ in the Bridge Output workspace displays options for placing a photo in a PDF layout, along with paper sizes, templates, a watermark, and options to apply a password.

a. Editing Box b. PDF button c. Animation Box d. Layout button

Computer Science & Information Technology

A(n) ________ associates matching fields between 2 tables

Fill in the blank(s) with correct word

Computer Science & Information Technology