1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
11

What are digital forensic techniques? A. Identifying, extracting, and evaluating evidence obtained from digital media such as co

mputer hard drives, CDs, DVDs, and other digital storage devices B. A series of tools and techniques used to prevent forensic examination from identifying an attack or attacker C. A set of concepts and practices that provide detailed descriptions and comprehensive checklists, tasks, and procedures for common IT practices D. A distributed data protection technology that leverages deep analysis, context evaluation, and rules configured from a central console to ensure confidential information remains secure while in use, in transit, and at rest
Computers and Technology
1 answer:
Naya [18.7K]3 years ago
6 0

Answer:

It's A.

Explanation:

the steps in digital forensics.

For those working in the field, there are five critical steps in computer forensics, all of which contribute to a thorough and revealing investigation.

Policy and Procedure Development.

Evidence Assessment.

Evidence Acquisition.

Evidence Examination.

Documenting and Reporting.

You might be interested in
The command to delete all the files that have filenames that starts with letter c or c and ends with a letter z or z is
dimaraw [331]
The command is : <span>rm [Aa]*[Zz] </span>
4 0
3 years ago
The user can close all the programs if he closes the open virtual desktop true false
steposvetlana [31]

The user cannot close all the programs if he closes the open virtual desktop.

<h3>What are virtual desktops?</h3>

A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.  The desktop environment is separated from the physical device used to access it.

I call it a false desktop.

It is use to separate your work activities.

Therefore, the user cannot close all the programs if he closes the open virtual desktop.

learn more on virtual desktop here: brainly.com/question/14332029

#SPJ12

3 0
2 years ago
You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access th
xxTIMURxx [149]

Answer:

IP

Explanation:

8 0
3 years ago
Discuss the role of the concept behind the "Internet of Things (IoT)" in today's digitally connected society.
AlekseyPX

Answer:

IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention.

Explanation:

hope that helps

7 0
3 years ago
Help me if you do then you get 10 points and brainliest
stellarik [79]

The answer is A. The earth was formed 4.54 years ago, and during those first serveral hundred million years, oceans, continents started to form.

A) Precambrian time.

3 0
3 years ago
Other questions:
  • Which statement is true about the elements of the interface of a presentation program? The status bar appears at the top of the
    14·2 answers
  • How do I take off the header off my second page in google docs ? ( I only need it on page 1)
    8·2 answers
  • After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready t
    7·1 answer
  • Blank includes websites that encourage interaction and connection among people ,business and organizations
    13·1 answer
  • A professor is working with five teams in his marketing research class. He decides to experiment with path-goal theory in helpin
    11·1 answer
  • A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more
    9·1 answer
  • Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 198
    7·1 answer
  • One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
    9·2 answers
  • Why do people make Among Us games on Ro-blox, and thousands of people play them, when Among Us is free on all devises?
    10·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!