Notifications
Clear all
Topic starter
A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM an downloaded the image to a secured USB drive to share with the government .
Which of the following should be taken into consideration during the process of releasing the drive to the government?
- A . Encryption in transit
B. Legal issues
C. Chain of custody
D. Order of volatility
E. Key exchange
Suggested Answer: C
Posted : 04/11/2022 2:44 am