ISC2 CISSP Practice Question
During a corporate security incident investigation, a security analyst needs to create an exact duplicate of a suspect's hard drive for forensic analysis. Which of the following approaches is the BEST choice for maintaining evidence admissibility?
Taking screenshots of active processes and file directories
Creating a bit-by-bit image using write blockers
Copying visible files to an external drive for analysis
Running a virus scan on the original drive to identify malware