Questions
Questions
Single choice

A company's financial data system was breached, and investigators are now gathering and preserving digital evidence from the compromised computers and servers to understand what happened and potentially use the findings in legal proceedings. The application of investigation and analysis techniques for this purpose is called: 

Options
A.Computer forensics
B.Incident response
C.Disaster recovery
D.Intrusion detection
View Explanation

View Explanation

Verified Answer
Please login to view
Step-by-Step Analysis
The scenario centers on preserving and examining digital evidence from compromised systems to understand events and potentially support legal action. This aligns with computer forensics, which involves the systematic collection, preservation, analysis, and presentation of digital evidence. Option 1: Computer ......Login to view full explanation

Log in for full answers

We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!

More Practical Tools for Students Powered by AI Study Helper

Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!