Which of the following could be useful to an organization that wants to test its incident response procedures without risking any system downtime?
Which of the following is the FIRST step taken to maintain the chain of custody in a forensic investigation?
An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process?