Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?

Which of the following steps in the Computer Forensic Investigation process limits the extent and
significance of an incident to ensure that it does not spread to other systems?

Which of the following steps in the Computer Forensic Investigation process limits the extent and
significance of an incident to ensure that it does not spread to other systems?

A.
Containment

B.
Detection

C.
Preparation

D.
Eradication

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *