List of questions
Related questions
Question 195 - CAS-004 discussion
A local government that is investigating a data exfiltration claim was asked to review the fingerprint of the malicious user's actions. An investigator took a forensic image of the VM an downloaded the image to a secured USB drive to share with the government. Which of the following should be taken into consideration during the process of releasing the drive to the government?
A.
Encryption in transit
B.
Legal issues
C.
Chain of custody
D.
Order of volatility
E.
Key exchange
Your answer:
0 comments
Sorted by
Leave a comment first