A technician has responded to a security issue with an employee's computer. Which of the following basic forensic steps should be taken NEXT?
A. Secure the area
B. Initiate Data collection
C. Create the forensics report
D. Verify the chain of custody
Ans: A. Secure the area
Computer Science & Information Technology
You might also like to view...
A person using webmail may be able to use a program such as ________ to connect to the server and thus download messages to work with offline
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft?
a. the rise of terrorists and organized crime groups b. the increasing use of compound surnames c. the trend toward removing social security numbers from drivers licenses d. the boundless nature of the Internet
Computer Science & Information Technology