A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. What is the next step in this investigation?
A. Preservation
B. Collection
C. Examination
D. Identification
B
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
Computer Science & Information Technology
You might also like to view...
To display the most common values in a specific field, what command would you use?
A) top B) all C) table D) rare
Computer Science & Information Technology
The item that is removed first from a stack is called the ______ of the stack.
a. front b. top c. base d. prime
Computer Science & Information Technology