____ is used both for intrusion analysis and as part of evidence collection and analysis. Select one: a. Configuration b. Loss analysis c. Forensics d. Rehearsal