CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-701 Practice Question

A cybersecurity analyst at a law firm needs to acquire data from a laptop that is part of an ongoing legal investigation. To maintain the integrity of the digital evidence, which of the following methods should the analyst employ first?

  • Modifying the file system metadata to flag as evidence

  • Creating a bit-by-bit image of the device's storage media

  • Filling out chain of custody forms before acquiring data

  • Reviewing the file access logs to verify data integrity

This question's topic:
CompTIA Security+ SY0-701 / 
Security Operations
Your Score:
Security Operations
General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Program Management and Oversight