CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-701 Practice Question

A cybersecurity analyst at a law firm needs to acquire data from a laptop that is part of an ongoing legal investigation. To maintain the integrity of the digital evidence, which of the following methods should the analyst employ first?

  • Creating a bit-by-bit image of the device's storage media

  • Reviewing the file access logs to verify data integrity

  • Modifying the file system metadata to flag as evidence

  • Filling out chain of custody forms before acquiring data

Subscribe to avoid duplicate questions and track your progress over time

Your Score:
Security Operations
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Program Management and Oversight
General Security Concepts
CompTIA Security+ SY0-701
  • General Security Concepts
  • Threats, Vulnerabilities, and Mitigations
  • Security Architecture
  • Security Operations
    • This question is filed here
  • Security Program Management and Oversight