Collecting the legal authorizations to begin an investigation are part of the ___________ stage of the model.

a. Identification/Assessment
b. Analysis
c. Collection/Acquisition
d. Reporting


a. Identification/Assessment

Computer Science & Information Technology

You might also like to view...

The read() method of the class RandomAccessFile returns the type:

a. byte b. int c. char d. double

Computer Science & Information Technology

Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?

A) Collection, acquisition, security, reporting B) Collection, examination, analysis, reporting C) Collection, security, analysis, reporting D) Collection, analysis, reporting, testifying

Computer Science & Information Technology

A company is sending out a message to all users informing them that all internal messages need to be digitally signed. This is a form of which of the following concepts?

A. Availability B. Non-repudiation C. Authorization D. Cryptography

Computer Science & Information Technology

A method used to change the size of a(n) ____ is to drag the window borders.

A. icon B. file C. window D. folder

Computer Science & Information Technology