After identifying illegal activity on a small business computer, a business owner asks the office secretary to log into the system to retrieve various files.
Which of the following aspects of procedural forensic analysis were violated in this scenario?
A. Data preservation
B. Proper channel reporting
C. Initial response identification
D. Tracking of documentation
CompTIA A+ 220-1101 (Core 1) ExamFULL Printable PDF and Software. VALID exam to help you PASS. |