A security breach has been discovered. You have identified where the breach occurred. What is the next step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification

A

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

The defined standard for the structure of an email is ____________

a. AARPA b. MIME c. ICMP d. RFC 2100

Computer Science & Information Technology

A common use of the type of list in the accompanying figure is to create a(n) ____________________, which is an alphabetic list of terms and their definitions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology