How is this accomplished?

When incident data is collected, it is important that evidentiary cross-contamination is prevented.
How is this accomplished?
A. by allowing unrestricted access to impacted devices
B. by not allowing items of evidence to physically touch
C. by ensuring power is removed to all devices involved
D. by not permitting a device to store evidence if it is the evidence itself.

cisco-exams

One thought on “How is this accomplished?

  1. D. by not permitting a device to store evidence if it is the evidence itself.

    Write Protection: Software or hardware that prevents data from being written to a storage device. Write protection ensures that digital evidence is not modified after it is seized.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.