Correct answer: To support root-cause analysis, legal/ compliance evidence, and avoid destroying critical clues
Detailed Explanation:
Logs, memory dumps, network captures, and disk images provide forensic evidence of attacker behavior, initial access, lateral movement, and data exfiltration. If remediation proceeds without preservation, crucial data could be overwritten or lost, hindering investigation, compliance reporting, or litigation support. This practice is a fundamental part of incident response lifecycle as defined in CySA+ objectives.
Correct answer: To support root-cause analysis, legal/ compliance evidence, and avoid destroying critical clues
Detailed Explanation:
Logs, memory dumps, network captures, and disk images provide forensic evidence of attacker behavior, initial access, lateral movement, and data exfiltration. If remediation proceeds without preservation, crucial data could be overwritten or lost, hindering investigation, compliance reporting, or litigation support. This practice is a fundamental part of incident response lifecycle as defined in CySA+ objectives.