Why are mobile devices sometimes difficult to investigate in a forensic examination?
A. There are no forensics tools available for examination.
B. They may contain cryptographic protection.
C. They have password-based security at logon.
D. They may have proprietary software installed to protect them.
A. There are no forensics tools available for examination.
B. They may contain cryptographic protection.
C. They have password-based security at logon.
D. They may have proprietary software installed to protect them.