Multiple Choice
During a criminal investigation, the prosecutor submitted the original hard drive from the suspect's computer as evidence. The defense objected during the trial proceedings, and the evidence was rejected. Which of the following practices should the prosecutor's forensics team have used to ensure the suspect's data would be admissible as evidence? (Select TWO.)
A) Follow chain of custody best practices
B) Create an identical image of the original hard drive, store the original securely, and then perform forensics only on the imaged drive.
C) Use forensics software on the original hard drive and present generated reports as evidence
D) Create a tape backup of the original hard drive and present the backup as evidence
E) Create an exact image of the original hard drive for forensics purposes, and then place the original back in service
Correct Answer:

Verified
Correct Answer:
Verified
Q395: A network administrator is concerned about a
Q396: A Chief Information Securiy Officer (CISO) is
Q397: A systems administrator has installed a disk
Q398: A Chief Information Security Officer (CISO is
Q399: A SaaS-based email service provider often receives
Q401: The Chief Executive Officer (CEO) of a
Q402: During a sprint, developers are responsible for
Q403: A school contracts with a vendor to
Q404: A security administrator is updating a company's
Q405: A company recently implemented a variety of