Find a video that shows how to perform a specific network forensics process, summarize the video, and attach it to your discussion. As an investigator, why do you need to know how to do network forensics?
What does an investigator need to do to determine if an access point is a rogue access point?
2. Explain briefly how a Web browser works.
3. What is a cache history?