A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. What is the next step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification

B

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

To display the most common values in a specific field, what command would you use?

A) top B) all C) table D) rare

Computer Science & Information Technology

The item that is removed first from a stack is called the ______ of the stack.

a. front b. top c. base d. prime

Computer Science & Information Technology