Comprehensive and Detailed Explanation From Exact Extract:
A “network data closet” attack is a physical-environment incident (hardware, cabling, physical access/tampering). Proper documentation in such cases includes documenting the scene and physical state of impacted items so that investigators can reconstruct what was present, what was changed, and how things were connected.
The All-in-One CySA+ guide explicitly states that an important step is documenting the physical environment and that an easy way is to take lots of photos of the scene:
Exact extract (All-in-One Exam Guide):
“Another important… step is to document the entire physical environment around a device. An easy way to do this is to take lots of photos of the scene.”
Why the other options are less correct:
A is a recovery/ops task, not primary incident documentation of a physical attack scene.
B may be useful in some contexts, but the best practice for a physical incident scene is to photograph impacted items and surroundings.
C can help later, but it’s not the first/best documentation action for a physical tampering incident compared to capturing the scene as-found.
Submit