Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
Complaint to police in a formal way regarding the incident
Turn off the infected machine
Leave it to the network administrators to handle
Call the legal department in the organization and inform about the incident
Correct answer: B
Question 2
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
Create a Chain of Custody Document
Send it to the nearby police station
Set a Forensic lab
Call Organizational Disciplinary Team
Correct answer: A
Question 3
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Planning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing
Planning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations
Planning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations
Planning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical security recommendations