Which of the following steps is not appropriate when saving compromised data from a hard drive?
A. Keeping a compromised system connected to a network during an investigation
B. Taking special care to avoid overwriting data in a swap partition
C. Booting a live Knoppix CD distribution
D. Powering down a compromised system after saving dynamic data
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here