• Post author:
  • Post category:Updated
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

A cybersecurity analyst has been called to a crime scene that contains several technology items including a computer. Which technique will be used so that the information found on the computer can be used in court?

  • log collection
  • rootkit
  • Tor
  • unaltered disk image
Answers Explanation & Hints:

A normal file copy does not recover all data on a storage device so an unaltered disk image is commonly made. An unaltered disk image preserves the original evidence, thus preventing inadvertent alteration during the discovery phase. It also allows recreation of the original evidence.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 26 – 28: Analyzing Security Data Group Exam Answers Full 100%

CyberOps Associate (200-201) Certification Practice Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments