Posted by: Pdfprep
Post Date: November 17, 2020
A security analyst has created an image of a drive from an incident.
Which of the following describes what the analyst should do NEXT?
A . The analyst should create a backup of the drive and then hash the drive.
B . The analyst should begin analyzing the image and begin to report findings.
C . The analyst should create a hash of the image and compare it to the original drive’s hash.
D . The analyst should create a chain of custody document and notify stakeholders.
Answer: C
Leave a Reply