WGU Digital-Forensics-in-Cybersecurity Question Answer
An organization believes that a company-owned mobile phone has been compromised.
Which software should be used to collect an image of the phone as digital evidence?
WGU Digital-Forensics-in-Cybersecurity Question Answer
An organization believes that a company-owned mobile phone has been compromised.
Which software should be used to collect an image of the phone as digital evidence?