A security breach has been discovered. You have identified where the breach occurred. What is the next step in this investigation?
A. Preservation
B. Collection
C. Examination
D. Identification
A
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
Computer Science & Information Technology
You might also like to view...
The defined standard for the structure of an email is ____________
a. AARPA b. MIME c. ICMP d. RFC 2100
Computer Science & Information Technology
A common use of the type of list in the accompanying figure is to create a(n) ____________________, which is an alphabetic list of terms and their definitions.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology