Documentation that provides details of every move and access of evidence is called ___?
CHAIN OF CUSTODY
A team of representatives from IT, management, legal, and public relations that is organized to respond to incidents is called ___?
COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
Any written evidence, such as printed reports or data in log files is called ___?
DOCUMENTARY EVIDENCE
Any observable occurrence within computer or network is called ___?
EVENT
An event that results in violation your security policy, or poses an imminent threat to your security policy is called ___?
INCIDENT
Any physical object that you can bring into court that you can touch, hold, and irately observe is called ___?
REAL EVIDENCE
FALSE
TRUE
Validate that an incident has occurred
Preparation
Containment
lessons learned
TRUE OR FALSE
FALSE
Failed attempt to access any account
High
Identification
Eradication
Documentary evidence
Chain of custody log
TRUE
TRUE