A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT?

A. Secure the area
B. Initiate Data collection
C. Create the forensics report
D. Verify the chain of custody

Ans: A. Secure the area

Computer Science & Information Technology

You might also like to view...

A person using webmail may be able to use a program such as ________ to connect to the server and thus download messages to work with offline

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft?

a. the rise of terrorists and organized crime groups b. the increasing use of compound surnames c. the trend toward removing social security numbers from drivers licenses d. the boundless nature of the Internet

Computer Science & Information Technology