1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
11

What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co

mputer hard drives, CDs, DVDs, and other digital storage devices B. A series of tools and techniques used to prevent forensic examination from identifying an attack or attacker C. A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices D. A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

It's A.

Explanation:

the steps in digital forensics.

For those working in the field, there are five critical steps in computer forensics, all of which contribute to a thorough and revealing investigation.

Policy and Procedure Development.

Evidence Assessment.

Evidence Acquisition.

Evidence Examination.

Documenting and Reporting.

You might be interested in
Do all light bulbs server a practical purpose?
Greeley [361]

Answer:

A light bulb produces light from electricity

6 0
3 years ago
Pls due soon
Natasha_Volkova [10]

Answer:

Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.

Explanation:

5 0
3 years ago
Which item can you add using the tag?
Svetllana [295]

Answer:

an image

Explanation:

good luck have a nice day

3 0
3 years ago
Read 2 more answers
Search engine bing offers
scoundrel [369]
Bing offers work pretty good, I have gotten the rewards a couple of times
6 0
3 years ago
Which example task should a developer use a trigger rather than a workflow rule for?
Komok [63]

Answer:

A. To set the primary contact on an account record when it is saved

Explanation:

After updating a Contact and then you set the Primary checkbox, the contact becomes the primary contact and this then updates the reference in the Parent Account. Triggers are used for this purpose and not workflow rule. In this case there is only one contact at a time that is set as Primary Contacts, and in the case where an Account does not have any Contacts, the first contact that is created is made the primary and the trigger sets that value in reference.

6 0
3 years ago
Other questions:
  • Which of the following is the correct order for arranging these titles in a subject filing system? A. Applications, Banking Serv
    5·1 answer
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • Why was the term personal computer created?
    5·1 answer
  • You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
    15·2 answers
  • A palindrome number is a number that remains the same when its digits are reversed. Like 16461, for example, is a palindrome num
    13·1 answer
  • Why coaxial cable is called coaxial cable?
    11·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • Assume we are testing a variable is_sunny in a while loop. is_sunny = “n”.
    13·1 answer
  • PLEASE HELP I FAILED TWICE AND HAVE ONLY ONE MORE TRY BEFORE MY GRADE ARE SET I AM CRYINGGGGG PLEASEEE IM BEGGINGGGGG
    10·1 answer
  • Write a function NumberOfPennies() that returns the total number of pennies given a number of dollars and (optionally) a number
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!