If we plan to use what we find in our digital forensics in a court of law, what should the evidence not be?
CBK 7: Security Operations
Source: ThorTeaches.com practice tests
D: The evidence we collect must be accurate, complete, authentic, convincing, admissible.
IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.