Notifications
Clear all
Topic starter
An organization that has suffered a cyber attack is performing a forensic analysis of the affected users' computers.
Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
- A . An imaging process was used to obtain a copy of the data from each computer.
B. The legal department has not been engaged.
C. The chain of custody has not been documented.
D. Audit was only involved during extraction of the Information
Suggested Answer: C
Posted : 09/02/2023 9:32 pm