A file has been compromised with corrupt data and might have additional information embedded within it. Which of the following actions should a security administrator follow in order to ensure data integrity of the file on that host?

A file has been compromised with corrupt data and might have additional information embedded within it. Which of the following actions should a security administrator follow in order to ensure data integrity of the file on that host?










A. Disable the wireless network and copy the data to the next available USB drive to protect the
data
B. Perform proper forensics on the file with documentation along the way.
C. Begin chain of custody for the document and disallow access.
D. Run vulnerability scanners and print all reports of all diagnostic results.







Answer: B


Computer Science

Learn More Multiple Choice Question :