Bob, an incident responder at CyberTech Solutions, is investigating a cybercrime attack occurred in the client company. He acquired the evidence data, preserved it, and started performing analysis on acquired evidentiary data to identify the source of the crime and the culprit behind the incident.
Identify the forensic investigation phase in which Bob is currently in.
- Post-investigation phase
- Vulnerability assessment phase
- Pre-investigation phase
- Investigation phase
Answer(s): D
Reference:
https://resources.infosecinstitute.com/topic/computer-forensics-investigation-case-study/
Show Answer Next Question