A security analyst gathered forensics from a recent intrusion in preparation for legal proceedings. The analyst used EnCase to gather the digital forensics, cloned the hard drive, and took the hard drive home for further analysis. Which of the following did the security analyst violate?
A) Cloning procedures
B) Chain of custody
C) Hashing procedures
D) Virtualization
Correct Answer:
Verified
Q114: An organization developed a comprehensive incident response
Q115: A large software company wants to move
Q116: A security analyst implemented a solution that
Q117: Given the Nmap request below:
Q118: A finance department employee has received a
Q120: Which of the following technologies can be
Q121: The Chief Information Officer (CIO) for a
Q122: A bad actor bypasses authentication and reveals
Q123: A security analyst received a series of
Q124: A security analyst is attempting to utilize
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents