A security breach has been discovered, and you are responsible for performing the forensic investigation into the breach. What is the first step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification

D

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

The use of the MsgBox action will increase errors within a database due to the unnecessary feedback they provide to users

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the function categories to their descriptions:

I. Database A. Provides information about the contents of a cell. II. Date & Time B. Analyzes data stored in a database format Excel and returns key values. III. Engineering C. Provides methods for manipulating date and time values. IV. Financial D. Calculates values used by engineers such as value conversions. V. Information E. Performs financial calculations such as payments, rates, and present value.

Computer Science & Information Technology