ExamGecko
Question list
Search
Search

Question 41 - Cybersecurity Audit discussion

Report
Export

Using digital evidence to provide validation that an attack has actually occurred is an example of;

A.
computer forensic
Answers
A.
computer forensic
B.
extraction.
Answers
B.
extraction.
C.
identification.
Answers
C.
identification.
D.
data acquisition.
Answers
D.
data acquisition.
Suggested answer: A

Explanation:

Using digital evidence to provide validation that an attack has actually occurred is an example of computer forensics. This is because computer forensics is a discipline that involves the identification, preservation, analysis, and presentation of digital evidence from various sources, such as computers, networks, mobile devices, etc., to support investigations of cyber incidents or crimes. Computer forensics helps to provide validation that an attack has actually occurred, by examining the digital traces or artifacts left by the attackers on the compromised systems or devices, and by reconstructing the sequence and timeline of events that led to the attack. The other options are not examples of using digital evidence to provide validation that an attack has actually occurred, but rather different techniques or processes that are related to computer forensics, such as extraction (B), identification C, or data acquisition (D).

asked 18/09/2024
luis gilberto correa betancur
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first