The correct answer is Comprehensive event logging with proper timestamps. Comprehensive event logging with proper timestamps is crucial for forensic investigation as it provides a historical record of system activities that can be analyzed to understand the sequence of events during a security incident. Properly implemented logging captures details about what happened, when it happened, and who was involved, enabling investigators to reconstruct the incident timeline and determine how an attack occurred and what was affected.
Formal verification of algorithms is incorrect because formal verification of algorithms helps prevent vulnerabilities but does not assist in investigating incidents after they occur. It's a preventative measure rather than a forensic aid.
Regular penetration testing is incorrect because regular penetration testing helps identify vulnerabilities before they can be exploited but doesn't provide information about actual incidents. Penetration testing is preventative and occurs before incidents rather than supporting investigation afterward.
Code obfuscation is incorrect because code obfuscation aims to prevent reverse engineering of applications but doesn't help with forensic investigation. In fact, obfuscation might hinder internal investigation efforts if incident responders need to analyze the code to understand an attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is comprehensive event logging?
Open an interactive chat with Bash
What is the importance of timestamps in event logging?
Open an interactive chat with Bash
How does event logging differ from penetration testing?
Open an interactive chat with Bash
ISC2 CISSP
Software Development Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access