Which of the following steps in the Computer Forensic Investigation process limits the extent and significance of an incident to ensure that it does not spread to other systems?
I've got a good strategy for this. I'll eliminate the options that don't seem relevant to an IPv6 fallback scenario, then select the two that best fit the description.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Makeda
4 months agoAdolph
4 months agoElly
4 months agoLenita
4 months agoKara
4 months agoLashawn
5 months agoMelissa
5 months agoStefan
5 months agoTresa
5 months agoVincenza
5 months agoLili
5 months agoMargarita
5 months ago