ISC2 CISSP Practice Question

In the course of an investigation, a security analyst needs to acquire a complete image of a compromised server's storage for further examination. Which tool is best suited for this purpose?

  • You selected this option

    A utility that recovers deleted files from a storage medium

  • You selected this option

    A software that analyzes network traffic for anomalies

  • You selected this option

    A program that removes malware from infected systems

  • You selected this option

    A tool that creates a forensically verifiable copy of the disk

ISC2 CISSP
Security Operations
Your Score:
Settings & Objectives
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot