Which of the following steps should be taken to prove the data integrity of information on this device during the investigation?

During the e-discovery process, a litigation hold has been placed on information stored in several
areas, including the mobile device of the Chief Financial Officer (CFO). Which of the following
steps should be taken to prove the data integrity of information on this device during the
investigation?

During the e-discovery process, a litigation hold has been placed on information stored in several
areas, including the mobile device of the Chief Financial Officer (CFO). Which of the following
steps should be taken to prove the data integrity of information on this device during the
investigation?

A.
Review logging on the device and connecting MDM server

B.
Isolate the device and apply chain of custody controls

C.
Encrypt information stored internally on the device

D.
Hash information stored on the device

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *