When collecting forensic data from a device, the most fragile and likely to be lost data is collected first and the most stable data should be collected last. This method of data collection based on fragility is known as the ____.
order of volatility
Diamond Model of Intrusion Analysis
Cyber Kill Chain®
chain of custody
Already signed up? Sign in
Let's continue studying where you left off.