1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LUCKY_DIMON [66]
2 years ago
12

What types of tools are used in the process of a digital or network investigation?

Computers and Technology
1 answer:
nadezda [96]2 years ago
3 0

Answer and Explanation:

The tools that are used in the network investigation process by the forensic departments in order to get better results while dealing with cyber crimes:

Some of the analysis tools are:

  1. Tools for file analysis
  2. Tools for Internet Analysis
  3. Email and Registry Analysis tools
  4. Database and Network Forensic tools
  5. tools for analysis of mobile devices.
  6. File viewers
  7. Tools  for mac Operating system analysis.
  8. Tools to capture data
  9. firewalls
  10. Encryption of network

Like in encryption of the data is encoded by cryptographic codes at the transmitting end and then decoded at the receiving end securely.

You might be interested in
How to revive a computer if it functions in an unexpected manner?
julsineya [31]
This would depend on the issue the computer is having. 

In many cases though a simple reboot does the trick. 

If your computer is slow and glitches, try cleaning it for viruses and also clean the fans. If they are dusty the computer can overheat and that can cause it to slow while its working harder to cool down.

In other cases you may not be running the proper software compatible with your device, or programs may be outdated. Check online with the company that manufactured your computer to see if you need to install updates or change certain software. 

3 0
2 years ago
Which of these utility tools would you least expect a support agent to find useful to increase security for end users?
tia_tia [17]

Answer:

b. Network performance monitor

Explanation:

A utility tool can be defined as a software application or program designed to add more functionality to a computer system, as well as to improve its performance efficiently. Some examples of commonly used utility tools in computer are file and folder backup tools, file management, antivirus, hard disk diagnostics, registry cleaner, network performance monitor, screensavers etc.

In the context of increasing security for the end users, the most important utility tools are;

1. Antivirus utility: to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

2. Rootkit utility: it can be used to detect and remove any rootkit program that is hidden in a computer.

3. Spyware utility: this is used to detect, remove and prevent malicious adware that are found in software applications.

<em>However, a network performance monitor is a utility tool that would be found to least support an agent in increasing security for end users because it is a utility tool that is primarily used to monitor network traffic and amount of data usage. </em>

7 0
3 years ago
In programming 5/2 is an example of what math?
wlad13 [49]

Answer:

division

Explanation:

/ in programming language is divide ÷

6 0
2 years ago
Read 2 more answers
Having knowledge of the main parts of a computer: CPU, ALU, INPUT, OUTPUT ,and MEMORY Can you explain in simple for dummies what
Morgarella [4.7K]

Answer:

Explanation:

Great question, it is important to ask these questions in order to get rid of any doubts you may be having.

I will explain this as simply as possible in separate parts.

CPU: the CPU is the brain of the computer where all the information is received, processed, and sent from.

ALU: are the digital circuits inside the CPU used to perform all the arithmetic and logic operations

INPUT: are the commands given to the computer by the user.

OUTPUT: is the information displayed on the screen by the computer.

Memory: is the piece of hardware used to save all the information that is currently being used by the computer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
2 years ago
Which of the following statements is FALSE?
ICE Princess25 [194]

Complicated faces and shapes are more easily remembered in games.

Thus, the correct option is C.

<h3>What is a game?</h3>

A game is a systematic kind of play that is typically done for enjoyment or fun, though it can also be used as a teaching tool.

A lot of games are also regarded as works of art. Sometimes people play games only for fun, while other times they play for recognition or reward.

Every game has participants, goals, a set of rules, and feedback. A game is what these things put together to make it.

A game's objectives, rules, difficulty level, and interactivity are crucial elements.

There are several reasons why people engage in mind games, but the main one is typically to exert control or authority over another individual.

Learn more about the games, here:

brainly.com/question/3863314

#SPJ1

3 0
1 year ago
Other questions:
  • Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
    12·1 answer
  • If you and another person want to encrypt messages, what should you provide that person with?
    10·1 answer
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    9·1 answer
  • Pick 2 different operating systems and discuss how they can be used in daily operations.
    5·1 answer
  • Assume that month is an int variable whose value is 1 or 2 or 3 or 5 ... or 11 or 12. Write an expression whose value is "jan" o
    10·1 answer
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • A domain account is one that is created on a Windows server domain controller (network) using (Describe Microsoft accounts)
    11·1 answer
  • What is the core function of an enterprise platform
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!