ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 296 - SY0-601 discussion

Report
Export

An employee's laptop was stolen last month. This morning, the was returned by the A cyberrsecurity analyst retrieved laptop and has since cybersecurity incident checklist Four incident handlers are responsible for executing the checklist. Which of the following best describes the process for evidence collection assurance?

A.
Time stamp
Answers
A.
Time stamp
B.
Chain of custody
Answers
B.
Chain of custody
C.
Admissibility
Answers
C.
Admissibility
D.
Legal hold
Answers
D.
Legal hold
Suggested answer: B

Explanation:

Chain of custody is a process that documents the chronological and logical sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Chain of custody is important to ensure the integrity and admissibility of evidence in legal proceedings. Chain of custody can help evidence collection assurance by providing proof that the evidence has been handled properly and has not been tampered with or contaminated.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.thoughtco.com/chain-of-custody-4589132

asked 02/10/2024
Frantisek Kohanyi Kohanyi
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first