A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. Then you collected the evidence needed. What is the next step in this investigation?

A. Preservation
B. Collection
C. Examination
D. Identification

C

Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision

Computer Science & Information Technology

You might also like to view...

As long as you have created the table relationships correctly, after you convert a text box to a Combo Box Access will make the appropriate connections in the Combo Box

Indicate whether the statement is true or false

Computer Science & Information Technology

A large mailing ordered by ZIP code that is eligible for reduced postage rates is known as ________ mail

A) combined B) sorted C) grouped D) bulk

Computer Science & Information Technology