Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?
A) Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
B) Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence
C) Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
D) Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media
Correct Answer:
Verified
Q480: Under which Federal Statutes does FBI investigate
Q481: What should you do when approached by
Q482: You are called in to assist the
Q483: What information do you need to recover
Q484: What does mactime, an essential part of
Q486: Volatile Memory is one of the leading
Q487: One way to identify the presence of
Q488: Which of the following refers to the
Q489: An Employee is suspected of stealing proprietary
Q490: When examining a hard disk without a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents