Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?

A) Collection, acquisition, security, reporting
B) Collection, examination, analysis, reporting
C) Collection, security, analysis, reporting
D) Collection, analysis, reporting, testifying


B) Collection, examination, analysis, reporting

Computer Science & Information Technology

You might also like to view...

Which of the following are the three packets exchanged at the beginning of a TCP connection between two ports?

a. SYN, SYN ACK, ACK b. SYN, SYN, ACK c. SYN, ACK, ACK d. TCP does not use SYN packets.

Computer Science & Information Technology

SharePoint ________ can be lists, libraries, site templates, and custom solutions

Fill in the blank(s) with correct word

Computer Science & Information Technology

This set of graphic text styles can be used to make text look like a graphic

a. WordArt b. Theme c. Footnote

Computer Science & Information Technology

What are the three major categories that questions can be organized into when setting up discussion sessions with clients and stakeholders?

What will be an ideal response?

Computer Science & Information Technology