Which of the following are the steps in a digital forensic analysis according to NIST Special Publication 800-87?
A) Collection, acquisition, security, reporting
B) Collection, examination, analysis, reporting
C) Collection, security, analysis, reporting
D) Collection, analysis, reporting, testifying
B) Collection, examination, analysis, reporting
You might also like to view...
Which of the following are the three packets exchanged at the beginning of a TCP connection between two ports?
a. SYN, SYN ACK, ACK b. SYN, SYN, ACK c. SYN, ACK, ACK d. TCP does not use SYN packets.
SharePoint ________ can be lists, libraries, site templates, and custom solutions
Fill in the blank(s) with correct word
This set of graphic text styles can be used to make text look like a graphic
a. WordArt b. Theme c. Footnote
What are the three major categories that questions can be organized into when setting up discussion sessions with clients and stakeholders?
What will be an ideal response?