The correct answer should be B - Extract relevant data from the suspected devices as early as possible.
First Responder do not do any data extraction. It is done by the forensic team. Choices A, C and D are found in the list first responser steps for network defenders (do's and don'ts)
Source - Certified Network Defender (CND) Version 2 eBook w/ iLabs (Volumes 1 through 4) Page 1457 - 1464
upvoted 1 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Margot
4 months agoEttie
4 months agoLatrice
4 months agoDominque
4 months agoShaunna
5 months agoDannette
5 months agoJohna
5 months agoApolonia
5 months agoTegan
5 months agoVannessa
5 months agoPura
5 months agoport_stack
4 years ago