The graduate conducts an analysis on gathered evidence using forensic cyber tools to determine the nature of a security breach. 2. The graduate executes recovery procedures for deleted data.