ISC2 CISSP Practice Question

During an internal investigation, the incident-response team enters an unlocked conference room and discovers an abandoned company-issued laptop believed to have been used the previous night to exfiltrate source code. The device is still powered on and connected to the corporate Wi-Fi network. According to recognized digital-forensics practice, which action should the team take FIRST to ensure the laptop can later serve as reliable evidence?

  • Document and initiate a chain-of-custody record for the laptop

  • Create a forensic working copy for the investigators

  • Open the event logs to identify suspicious activity

  • Run a full malware scan on the live system

ISC2 CISSP
Security Operations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot