A security team discovers a laptop suspected of being used in a data breach incident. What should be the FIRST action taken with this potential evidence?
Establishing and documenting the chronological record of custody is the correct first action when handling potential evidence. This documentation process records who had possession of the evidence, when they had it, and what actions were performed with it. This unbroken record is essential for maintaining evidence integrity and ensuring admissibility in potential legal proceedings.
The other options are incorrect because:
Creating working copies is an important step but should only occur after the evidence has been properly documented and secured. Making copies without first establishing proper documentation could compromise evidence integrity.
Performing a malware scan immediately on the original device could alter metadata, timestamps, or remove potential evidence, compromising the integrity of the original evidence.
Examining system logs directly on the device could modify access dates and potentially overwrite important evidence. Forensic investigation should be conducted on properly created forensic images, not on the original evidence.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a chronological record of custody?
Open an interactive chat with Bash
Why is documenting custody considered more important than performing a malware scan?
Open an interactive chat with Bash
How does the chain of custody prevent evidence tampering?
Open an interactive chat with Bash
ISC2 CISSP
Security Operations
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access