What is the BEST method if an investigator wishes to analyze a hard drive which may be used as evidence?
A) Leave the hard drive in place and use only verified and authenticated Operating Systems (OS) utilities to analyze the contents
B) Log into the system and immediately make a copy of all relevant files to a Write Once, Read Many (WORM) device
C) Remove the hard drive from the system and make a copy of the hard drive's contents using imaging hardware
D) Use a separate bootable device to make a copy of the hard drive before booting the system and analyzing the hard drive
Correct Answer:
Verified
Q245: The MAIN task of promoting security for
Q246: Which of the following BEST describes the
Q247: An organization's information security strategic plan MUST
Q248: Which of the following provides the BEST
Q249: In order to support the least privilege
Q251: Which of the following is the final
Q252: In a dispersed network that lacks central
Q253: From a security perspective, which of the
Q254: Which of the following is a standard
Q255: How does a Host Based Intrusion Detection
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents