Match the following terms to their meanings:
I. Malware installed from a malicious Web site A. EFS
II. Stores your data in an encrypted format on a hard drive B. event log
III. Security feature that encrypts all the data stored C. drive-by downloads
on a volume
IV. Displays detailed information about significant D. BitLocker Drive
actions on a computer Encryption
V. Record of your computer's actions E. Event Viewer
C, A, D, E, B
You might also like to view...
Media that is used to collect digital evidence must be forensically ____.
A. sterile B. codified C. hashed D. blocked
Provide examples of data mining applications.
What will be an ideal response?
Which of the following is NOT identified in the textbook as a major job hunting resource?
A) Job fair B) Online job board C) Newspaper classified ad D) Company website
The ________ tool is a tool in the Office 365 calendar that allows the user to request a meeting at a time the recipient is free
Fill in the blank(s) with correct word