Why do you believe that these two tools are the best choice to stop network, DOS, and/or Windows attacks? Provide a rationale.

Cyber crime Tools

Select two forensic investigator tools from the list below:

Autopsy.
Magnet Encrypted Disk Detector.
Wireshark.
Magnet RAM Capture.
Network Miner.
NMAP.
RAM Capturer.

Describe the tools you have selected:
How do each of the tools work?
How are they different from each other?
Why do you believe that these two tools are the best choice to stop network, DOS, and/or Windows attacks? Provide a rationale.
Describe an event or instance when one of these tools is the superior counter measure.