Which of the following is an example of properly handling a system after an attack?

Which of the following is an example of properly handling a system after an attack?

Which of the following is an example of properly handling a system after an attack?

A.
Placing a bag on the system

B.
Tagging each system element

C.
Removing RAM from the system

D.
Removing the hard drive from the system

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *