Multiple Choice
The Chief Information Security Officer (CISO) of an e-retailer, which has an established security department, identifies a customer who has been using a fraudulent credit card. The CISO calls the local authorities, and when they arrive on-site, the authorities ask a security engineer to create a point-in-time copy of the running database in their presence. This is an example of:
A) creating a forensic image
B) deploying fraud monitoring
C) following a chain of custody
D) analyzing the order of volatility
Correct Answer:

Verified
Correct Answer:
Verified
Q286: A vendor develops a mobile application for
Q287: An organization's network engineering team recently deployed
Q288: A penetration testing manager is contributing to
Q289: A breach was caused by an insider
Q290: An organization wants to arm its cybersecurity
Q292: A company is migrating systems from an
Q293: As a result of an acquisition, a
Q294: A forensic analyst suspects that a buffer
Q295: A security analyst is classifying data based
Q296: A company has decided to lower costs