Notifications
Clear all
Topic starter
07/11/2022 10:42 pm
An organization has determined that one of its web servers has been compromised.
Which of the following actions should be taken to preserve the evidence of the intrusion for forensic analysis and potential litigation?
- A . Run analysis tools to detect the source of the intrusion.
- B . Reboot the server in a secure area to search for digital evidence.
- C . Unplug the server from the power.
- D . Restrict physical and logical access to the server.
Suggested Answer: D