Crucial Technologies is conducting post-incident forensics after a possible compromise of a system. Before the system gets to its destination it will pass through numerous employees in the IT department. What document needs to be updated with the system as it makes its way to the proper section?

  • Chain of custody
  • The operating system
  • Copy of the harddrive
  • The incident ticket
  • Each employee's timecard

Your Score:
Operating Systems
Security
Software Troubleshooting
Operational Procedures
CompTIA A+ 220-1102
  • Operating Systems
  • Security
  • Software Troubleshooting
  • Operational Procedures
    • This question is filed here