EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 4 : Data Acquisition and Duplication
         
Questions available : 33 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 700  
   
Chris has been called upon to investigate a hacking incident reported by one of his clients. The company suspects the involvement of an insider accomplice in the attack. Upon reaching the incident scene, Chris secures the physical area, records the scene using visual media. He shuts the system down by pulling the power plug so that he does not disturb the system in any way. He labels all cables and connectors prior to disconnecting any. What do you think would be the next sequence of events?


 
A:    Connect the target media; prepare the system for acquisition; Secure the evidence; Copy the media
 
B:    Prepare the system for acquisition; Connect the target media; copy the media; Secure the evidence
C:    Connect the target media; Prepare the system for acquisition; Secure the evidence; Copy the media
 
D:    Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Krishna on 14/03/2024
Opted Answer: D
Given the scenario described, the next sequence of events should be:

D: Secure the evidence; prepare the system for acquisition; Connect the target media; copy the media

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations