Bonney's system has been compromised by a gruesome malware.
What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
Answer : B
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
Answer : A
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
Answer : A
Reference: https://info-savvy.com/setting-up-a-computer-forensics-lab/
Which of the following directory will contain logs related to printer access?
Answer : A