Which of the following should Jane, a security administrator, perform before a hard drive is
analyzed with forensics tools?
A.
Identify user habits
B.
Disconnect system from network
C.
Capture system image
D.
Interview witnesses
Which of the following should Jane, a security administrator, perform before a hard drive is
analyzed with forensics tools?
Which of the following should Jane, a security administrator, perform before a hard drive is
analyzed with forensics tools?
A.
Identify user habits
B.
Disconnect system from network
C.
Capture system image
D.
Interview witnesses