Practice Question
During a forensic investigation, you discover a file named "passwords.txt" on a compromised workstation. It appears to contain a list of usernames and passwords. What is the MOST important step to take regarding this file?
a) Open the file to verify the contents and determine the scope of the potential breach.
b) Immediately delete the file to prevent further unauthorized access.
c) Securely copy the file to a separate forensic workstation for analysis, ensuring chain of custody.
d) Encrypt the file in place and notify the system administrator to change all listed passwords.
4
13 comments
Fouad Ahmed
6
Practice Question
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by