A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?

A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody

Answer: D. Chain of custody

Computer Science & Information Technology

You might also like to view...

A sidebar is usually set in larger type, often in a different font or italics, and may be offset with borders at the top, bottom, or on the sides

Indicate whether the statement is true or false

Computer Science & Information Technology

The top row in a data source is called the ________ row and identifies the fields in the succeeding rows

Fill in the blank(s) with correct word

Computer Science & Information Technology