Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence
A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsiblity
CompTIA exam questions
Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence
A. Legal hold
B. Chain of custody
C. Secure copy protocol
D. Financial responsiblity
A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?
A. Document the scene
B. Forensics report
C. Evidence collection
D. Chain of custody
An organization is involved in a civil court action and needs to ensure email messages are retained. Which of the following describes the requirement to archive and retain email traffic and other correspondence?
A. Chain of custody
B. Legal hold
C. Divide and conquer
D. Persistent agents