A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody
Answer: D. Chain of custody
Computer Science & Information Technology
You might also like to view...
A sidebar is usually set in larger type, often in a different font or italics, and may be offset with borders at the top, bottom, or on the sides
Indicate whether the statement is true or false
Computer Science & Information Technology
The top row in a data source is called the ________ row and identifies the fields in the succeeding rows
Fill in the blank(s) with correct word
Computer Science & Information Technology