We are performing digital forensics on one of our hard drives, which of these could be part of what use?
A: Symmetric encryption.
B: Asymmetric encryption.
CBK 7: Security Operations
Source: ThorTeaches.com practice tests
C: Digital forensics: The evidence we collect must be accurate, complete, authentic, convincing, admissible. Everything is documented, chain of custody: Who had it when? What was done? When did they do it? Pull the original, put it in write protected machine, we make a hash. We only do examinations and analysis on bit level copies, we confirm they have the same hash as the original before and after examination.
IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.