1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
3 years ago
12

What types of tools are used in the process of a digital or network investigation?

Computers and Technology
1 answer:
nadezda [96]3 years ago
3 0

Answer and Explanation:

The tools that are used in the network investigation process by the forensic departments in order to get better results while dealing with cyber crimes:

Some of the analysis tools are:

  1. Tools for file analysis
  2. Tools for Internet Analysis
  3. Email and Registry Analysis tools
  4. Database and Network Forensic tools
  5. tools for analysis of mobile devices.
  6. File viewers
  7. Tools  for mac Operating system analysis.
  8. Tools to capture data
  9. firewalls
  10. Encryption of network

Like in encryption of the data is encoded by cryptographic codes at the transmitting end and then decoded at the receiving end securely.

You might be interested in
.Write a MATLAB script that VECTORIZES (eliminates the loop) the following code. (4points)
gladu [14]

Answer:

Explanation:

try

clc

clear

close all

x=linspace(0,2*pi,7);

z=cos(pi.*x./3)

% the output on mine is to 4 decimals so it looks a bit different than what the output on your example is , but, I think if you change the format to decimal 2 it will look the same  :)

4 0
3 years ago
Describe the difference between a chained conditional and a nested conditional. Give your own example of each.
I am Lyosha [343]
Here you go :) have a good day :))))

5 0
3 years ago
Are all the computer users known as programmer ​
Evgesh-ka [11]

Answer:

Nope

Explanation:

programmers are diff

6 0
2 years ago
This operating system was used by individual computers and required users to type commands.
In-s [12.5K]

Answer:

MS-DOS is your answer

Explanation:

6 0
3 years ago
What is the meaning of ethics? Check all of the boxes that apply
suter [353]

Answer:

behavior that is good for everyone

following the rules

behaving in a way that would be easy to defend

Explanation:

6 0
3 years ago
Other questions:
  • Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
    6·1 answer
  • How can i appear offline without fb messenger saying "last active 1 minute ago"?
    5·1 answer
  • The one place where c++ allows aggregate operations on arrays is the input and output of c-strings.
    8·1 answer
  • Write a function named get_my_age that returns your age as an int (this is YOUR age, so if you were 21 you would return the numb
    11·1 answer
  • When we put 10+ points for when we ask a question, do we loose the points we have?
    12·1 answer
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • 16. Which of the following wire gage sizes is the thickest? A. 14 B. 8 C. 0 D. -33
    14·1 answer
  • You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
    11·1 answer
  • Explain software piracy and Hacking​
    13·2 answers
  • Question 1
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!