This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ◦ Describe some of the similarities and differences between performing real-time forensics with Encase Enterprise and a bit-image copy of a stand-alone system with your team in the training. ◦ When is it more productive for the case to use real-time covert forensics acquisition than overt imaging of a suspect drive? • Post a new topic to the Discussion Board that contains your responses pertaining to the above information. • Comment on at least two other students' posts and discuss their answers in a way that encourages further discussion. ◦ What did you find factual about their response? ◦ How could you expand on their response or comments when interacting with others? A reference of WEB site Link only & or Book info....
View Full Document
This note was uploaded on 04/01/2012 for the course ECON hui taught by Professor Uiuhuh during the Spring '12 term at York University.
- Spring '12