题目
单项选择题
A company's financial data system was breached, and investigators are now gathering and preserving digital evidence from the compromised computers and servers to understand what happened and potentially use the findings in legal proceedings. The application of investigation and analysis techniques for this purpose is called:
选项
A.Computer forensics
B.Incident response
C.Disaster recovery
D.Intrusion detection
查看解析
标准答案
Please login to view
思路分析
The scenario centers on preserving and examining digital evidence from compromised systems to understand events and potentially support legal action. This aligns with computer forensics, which involves the systematic collection, preservation, analysis, and presentation of digital evidence.
Option 1: Computer ......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
Which of the following is a crucial step in the digital forensic investigation methodology?
A digital forensic investigator is examining a computer system suspected to contain evidence of unauthorized access. In this context, which principle is critical for the investigator to adhere to during the investigation?
What is a primary responsibility of a Digital Evidence First Responder (DEFR)?
How can the principle of reliability be ensured in digital evidence handling?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!