CIS 562 Week 3 Discussion
CIS 562 Week 3 Discussion 1
"Data Acquisition and RAID" Please respond to the following:
- Describe at least three challenges of performing data acquisition on a device using a RAID (Redundant Array of Independent Disks) disk configuration. Determine whether or not you believe any one RAID configuration presents more challenges than the others and provide justification.
- From the e-Activity, thoroughly describe the RAID data acquisition forensics tool you researched, including at a minimum its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.
CIS 562 Week 3 Discussion 2
"Data Acquisition and RAID" Please respond to the following:
- Describe at least three challenges of performing data acquisition on a device using a RAID (Redundant Array of Independent Disks) disk configuration. Determine whether or not you believe any one RAID configuration presents more challenges than the others and provide justification.
- From the e-Activity, thoroughly describe the RAID data acquisition forensics tool you researched, including at a minimum its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.
CIS 562 Week 3 Discussion 2
"Data Acquisition and RAID" Please respond to the following:
- Describe at least three challenges of performing data acquisition on a device using a RAID (Redundant Array of Independent Disks) disk configuration. Determine whether or not you believe any one RAID configuration presents more challenges than the others and provide justification.
- From the e-Activity, thoroughly describe the RAID data acquisition forensics tool you researched, including at a minimum its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.