PrepAway - Latest Free Exam Questions & Answers

Which of the following is NOT one of these procedures?

During the investigation of a computer crime, audit trails can be very
useful. To ensure that the audit information can be used as evidence,
certain procedures must be followed. Which of the following is NOT
one of these procedures?

PrepAway - Latest Free Exam Questions & Answers

A.
Mechanisms should be in place to protect the integrity of the audit
trail information.

B.
The audit trail information must be used during the normal course
of business.

C.
There must be a valid organizational security policy in place and in
use that defines the use of the audit information.

D.
Audit trails should be viewed prior to the image backup.

Explanation:
The image backup should be done first in order not to modify any
information on the hard disk. For example, the authentication
process applied to a hard disk can change the time of last access
information on files. Thus, authentication should be applied to a disk
image copy.


Leave a Reply