Describe the role of cyber forensics examiners and unique factors to keep in
mind when collecting evidence at a scene. As a cyber investigator, create your
investigative environment. Install the VM or Sandbox of your choice, and then create
an encrypted container for the storage of your case work. Install or run your
anonymization service (VPN or TOR) within your VM/Sandbox and preserve a
webpage of your choosing (preserve webpage, find domain owner, file metadata, IP
address, etc.). Generate a word document to include screenshots of each action.
Describe what tools you are using and why you choose that particular tool.