ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 283 - CAS-004 discussion

Report
Export

During a recent security incident investigation, a security analyst mistakenly turned off the infected machine prior to consulting with a forensic analyst. upon rebooting the machine, a malicious script that

was running as a background process was no longer present. As a result, potentially useful evidence was lost. Which of the following should the security analyst have followed?

A.
Order of volatility
Answers
A.
Order of volatility
B.
Chain of custody
Answers
B.
Chain of custody
C.
Verification
Answers
C.
Verification
D.
Secure storage
Answers
D.
Secure storage
Suggested answer: A

Explanation:

Order of volatility is a procedure that a computer forensics examiner must follow during evidence collection. It refers to the order in which digital evidence is collected, starting with the most volatile and moving to the least volatile. Volatile data is data that is not permanent and is easily lost, such as data in memory when you turn off a computer. The security analyst should have followed the order of volatility to preserve the most fragile evidence first, such as the malicious script running as a background process, before turning off the infected machine. Verified

Reference:

https://www.computer-forensics-recruiter.com/order-of-volatility/

https://www.sans.org/blog/best-practices-in-digital-evidence-collection/

https://blogs.getcertifiedgetahead.com/order-of-volatility/

asked 02/10/2024
MARIO CRUZ
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first