cloud computing and digital forensics

   Answer adown two questions: 1) Digital Forensics Tools & Tchq: Review the symbolical on routers.It is rarely said that notice extracted from a router or switch does not necessarily contribute restricted averment of a feature misdeed. What is meant by that?  If penny, what then is the most available notice attentive from these devices in an research? Shaft your judicious counterpart by the end of day on Thursday.Post between 250 and 300 signification.Overview: Proactive gathering of averment,Post-incident gathering,Router and switch forensics 2) Outshine computing/outshine security: Discuss in 500 signification or past the top 5 details that should be intervening in your outshine SLA. Use at smallest three sources. Include at smallest 3 quotes from your sources enclosed in quotation marks and selectd in-line by intimation to your intimation register.  Example: "signification you copied" (citation) these quotes should be one bountiful phrase not altered or paraphrased. Select your sources using APA format. Use the quotes in your paragraphs. Copying outside attribution or the use of spinbot or other vocable superabundance software procure upshot in a gradation of 0. Write in essay format not in bulleted, numbered or other register format. It is material that you use your own signification, that you select your sources that you consent after a while the instructions touching prolixity of your shaft.