CompTIA CySA+ CS0-003 Practice Question
When conducting forensic analysis, what is primarily sought to determine the actions that took place on a digital system?
User permissions
Hash value
Timeline of events
Encryption algorithms
When conducting forensic analysis, what is primarily sought to determine the actions that took place on a digital system?
User permissions
Hash value
Timeline of events
Encryption algorithms