What are two differences in how tampered and untampered disk images affect a security incident? (Choose two.)
A . Untampered images are used in the security investigation process
B . Tampered images are used in the security investigation process
C . The image is tampered if the stored hash and the computed hash match
D . Tampered images are used in the incident recovery process
E . The image is untampered if the stored hash and the computed hash match
Answer: A,E
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund