A security breach has been discovered. You have conducted a thorough forensic investigation of the breach. What is the last step in this investigation?
A. Preservation
B. Analysis
C. Presentation
D. Decision
D
Explanation: Any forensic investigation involves the following steps:
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
7. Decision
Computer Science & Information Technology
You might also like to view...
Schemas normally use the ______ extension.
a) .shm b) .sch c) .xsd d) .schema
Computer Science & Information Technology
You can warp any rasterized object by clicking Edit on the Menu bar, pointing to Transform, and then clicking Warp.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology