Which of the follow...
 
Notifications
Clear all

Which of the following of the security analyst violate?

1 Posts
1 Users
0 Likes
175 Views
(@palomamikel)
Noble Member
Joined: 2 years ago
Posts: 733
Topic starter  

A security analyst gathered forensics from a recent intrusion in preparation for legal proceedings. The analyst used EnCase to gather the digital forensics. cloned the hard drive, and took the hard drive home for further analysis.

Which of the following of the security analyst violate?

  • A . Cloning procedures
  • B . Chain of custody
  • C . Hashing procedures
  • D . Virtualization

Show Answer Hide Answer

Suggested Answer: B

   
Quote
Topic Tags

Latest CS0-002 V1 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: