Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?
A) Collection, acquisition, security, reporting
B) Collection, examination, analysis, reporting
C) Collection, security, analysis, reporting
D) Collection, analysis, reporting, testifying
B) Collection, examination, analysis, reporting
You might also like to view...
The AutoSize property is used to:
a) change the size of the image to fit the PictureBox b) change the size of the PictureBox to fit the image c) find a medium between the PictureBox and the actual picture d) make the picture as large as possible while still maintaining quality
Case-Based Critical Thinking QuestionsCase 2-1Zhanna is working on a short presentation on the technologies that make the World Wide Web work. She has several questions and has asked her friend Kyra to help her.Zhanna has heard of the TCP/IP protocols, but is uncertain about what they do. Kyra explains that ____ moves packets of information from one computer to another.
A. TCP B. IP C. HTTP D. any of the above