List of questions
Related questions
Question 185 - CISSP-ISSMP discussion
Which of the following steps are generally followed in computer forensic examinations? Each correct answer represents a complete solution. Choose three.
A.
Acquire
B.
Analyze
C.
Authenticate
D.
Encrypt
Your answer:
0 comments
Sorted by
Leave a comment first