Collecting the legal authorizations to begin an investigation are part of the ___________ stage of the model.
a. Identification/Assessment
b. Analysis
c. Collection/Acquisition
d. Reporting
a. Identification/Assessment
You might also like to view...
The read() method of the class RandomAccessFile returns the type:
a. byte b. int c. char d. double
Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?
A) Collection, acquisition, security, reporting B) Collection, examination, analysis, reporting C) Collection, security, analysis, reporting D) Collection, analysis, reporting, testifying
A company is sending out a message to all users informing them that all internal messages need to be digitally signed. This is a form of which of the following concepts?
A. Availability B. Non-repudiation C. Authorization D. Cryptography
A method used to change the size of a(n) ____ is to drag the window borders.
A. icon B. file C. window D. folder