Which of the following is an example of properly handling a system after an attack?
A.
Placing a bag on the system
B.
Tagging each system element
C.
Removing RAM from the system
D.
Removing the hard drive from the system
Explanation:
Which of the following is an example of properly handling a system after an attack?
Which of the following is an example of properly handling a system after an attack?
A.
Placing a bag on the system
B.
Tagging each system element
C.
Removing RAM from the system
D.
Removing the hard drive from the system
Explanation: