1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
11

What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co

mputer hard drives, CDs, DVDs, and other digital storage devices B. A series of tools and techniques used to prevent forensic examination from identifying an attack or attacker C. A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices D. A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

It's A.

Explanation:

the steps in digital forensics.

For those working in the field, there are five critical steps in computer forensics, all of which contribute to a thorough and revealing investigation.

Policy and Procedure Development.

Evidence Assessment.

Evidence Acquisition.

Evidence Examination.

Documenting and Reporting.

You might be interested in
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
3 years ago
Several people work with data at Erica’s office. She enters data. One of her coworkers enters new product numbers. Another cowor
Dvinal [7]

Answer:

a software program for storing, managing, and retrieving information

Explanation:

8 0
3 years ago
What is digital museum​
umka2103 [35]

Access hundreds of professional development resources for museum professionals. Museum professionals can benefit at any career stage from student to retiree. Student Membership. Industry Membership. Established Since 1906. Museum Memebership. 501(c)3 Nonprofit Org.

7 0
3 years ago
Read 2 more answers
A Venn diagram is used to show...?<br> Plz help
11Alexandr11 [23.1K]
Venn diagrams are used to depict set intersections (denoted by an upside-down letter U)......
6 0
3 years ago
Read 2 more answers
Which of these devices is usually the default for most home network?
lora16 [44]

Answer:

there are no mutiple choices

5 0
4 years ago
Other questions:
  • What is the last step in conducting url search
    11·1 answer
  • Ethan is responsible for writing the dialogue in a movie. Which role is he playing? Ethan is playing the role of a(n).....''BLAN
    8·1 answer
  • Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
    8·1 answer
  • If the Account Number field in a record always should display the three characters in the account number in uppercase, then the
    14·1 answer
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • Write a basic program that performs simple file and mathematical operations.
    6·1 answer
  • Which command compiles the Java source code file Welcome.java?
    11·1 answer
  • How do i know when someone answered my questions and where can i check what they wrote?
    6·1 answer
  • Write a C program to calculate and display the coordinates of midpoint - M of a linesegment between two given points - say A and
    7·1 answer
  • Each wireless network has its own name to identify it, known as service set identity. true false
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!