Multiple Choice
A security analyst gathered forensics from a recent intrusion in preparation for legal proceedings. The analyst used EnCase to gather the digital forensics, cloned the hard drive, and took the hard drive home for further analysis. Which of the following did the security analyst violate?
A) Cloning procedures
B) Chain of custody
C) Hashing procedures
D) Virtualization
Correct Answer:

Verified
Correct Answer:
Verified
Q134: Which of the following are components of
Q135: When attempting to do a stealth scan
Q136: A cybersecurity analyst is contributing to a
Q137: While planning segmentation for an ICS environment,
Q138: Given the Nmap request below: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1257/.jpg"
Q140: An audit has revealed an organization is
Q141: A team of security analysts has been
Q142: A Chief Security Officer (CSO) is working
Q143: A security analyst received an alert from
Q144: For machine learning to be applied effectively