Which of the following steps are generally followed in computer forensic examinations?
Each correct answer represents a complete solution. Choose three.
Encrypt
Analyze
Acquire
Authenticate
Submit