Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
Correct Answer:
B
🗳️
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
Correct Answer:
A
🗳️
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Correct Answer:
A
🗳️
Which of the following directory will contain logs related to printer access?
Correct Answer:
B
🗳️