Question 108:
A security analyst gathered forensics from a recent intrusion in preparation for legal proceedings. The analyst used EnCase to gather the digital forensics, cloned the hard drive, and took the hard drive home for further analysis. Which of the following did the security analyst violate?
Answer options:
A. Cloning procedures B. Chain of custody C. Hashing procedures D. Virtualization