1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
11

What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co

mputer hard drives, CDs, DVDs, and other digital storage devices B. A series of tools and techniques used to prevent forensic examination from identifying an attack or attacker C. A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices D. A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

It's A.

Explanation:

the steps in digital forensics.

For those working in the field, there are five critical steps in computer forensics, all of which contribute to a thorough and revealing investigation.

Policy and Procedure Development.

Evidence Assessment.

Evidence Acquisition.

Evidence Examination.

Documenting and Reporting.

You might be interested in
Once a software program has been through one test cycle performed by the programmers and is running proper
Lera25 [3.4K]
Yes, some may also say that they release it to the beta testers.

Occasionally, they release it to alpha testers before beta testers as another step.
8 0
3 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
Antivirus software products require that you update _____ on a regular basis
german
Operating System, as far as I know @[email protected]
5 0
3 years ago
Read 2 more answers
What single awk command can be used to display all the login names and their associated numerical user IDs
Luden [163]

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

8 0
3 years ago
Which of the following resources is an example of a web-based application?
kompoz [17]
The answer will be google docs since it depends on a web and its an application. hope it helps

3 0
3 years ago
Other questions:
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
    15·2 answers
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • 14. Convert 11110111 from binary to denary<br> (1 Point)
    12·2 answers
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • You have heard that it is possible to improve your computer's performance by storing all related files for a particular program
    9·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • A printer is considered to be in the category of
    5·2 answers
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!