Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?

A) Collection, acquisition, security, reporting
B) Collection, examination, analysis, reporting
C) Collection, security, analysis, reporting
D) Collection, analysis, reporting, testifying

B) Collection, examination, analysis, reporting

Computer Science & Information Technology

You might also like to view...

The AutoSize property is used to:

a) change the size of the image to fit the PictureBox b) change the size of the PictureBox to fit the image c) find a medium between the PictureBox and the actual picture d) make the picture as large as possible while still maintaining quality

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 2-1Zhanna is working on a short presentation on the technologies that make the World Wide Web work. She has several questions and has asked her friend Kyra to help her.Zhanna has heard of the TCP/IP protocols, but is uncertain about what they do. Kyra explains that ____ moves packets of information from one computer to another.

A. TCP B. IP C. HTTP D. any of the above

Computer Science & Information Technology