A security breach has been discovered. You have identified the attack and preserved the affected systems and devices. Then you collected the evidence needed. What is the next step in this investigation?
A. Preservation
B. Collection
C. Examination
D. Identification
C
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
Computer Science & Information Technology
You might also like to view...
As long as you have created the table relationships correctly, after you convert a text box to a Combo Box Access will make the appropriate connections in the Combo Box
Indicate whether the statement is true or false
Computer Science & Information Technology
A large mailing ordered by ZIP code that is eligible for reduced postage rates is known as ________ mail
A) combined B) sorted C) grouped D) bulk
Computer Science & Information Technology