A user’s computer is suspected of hosting illegal files. The IT department has removed the computer and placed it in a secured, cypher-locked room, where it will remain until the local authorities arrive. Which of the following actions should the IT department perform NEXT?
A. Preserve data integrity
B. Identify violations of acceptable use
C. Collect evidence of illegal activity
D. Report through proper channels
CompTIA A+ 220-1102 (Core 1) ExamFULL Printable PDF and Software. VALID exam to help you PASS. |
D. Report through proper channels —
B and C, do not make any sense in this question. We can scratch these.
Not A — the computer has been put in a cypher-locked room, so the “Data is being preserved”
Yes D. Report through proper channels – The question says we are waiting for the local authorities – which implies implementing a chain of custody.
a. Preserve the integrity = custody of chains.