Using digital evidence to provide validation that an attack has actually occurred is an example of;
A . computer forensic
B . extraction.
C . identification.
D . data acquisition.
Answer: A
Latest Cybersecurity Audit Certificate Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund