Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
DOS boot disk
EnCase with a hardware write blocker
Linux Live CD
Secure Authentication for EnCase (SAFE)
Submit