A process focused on the identification and location of potential evidence related to a specific legal action after it was collected through digital forensics is known as _________.
A. e-discovery
B. forensics
C. indexing
D. root cause analysis
Answer: A
You might also like to view...
MC The __class__ attribute is a special attribute of a(n)______ .
a) object of a class. b) object reference. c) class. d) None of the above.
The length of a string can be determined by ________.
a. the String method length() b. the String instance variable length c. the String method strlen() d. All of the above.
Other than implementing preventative measures and planning out response and recovery strategies, what is another important element that will help minimize data loss in the event of a harmful event that would trigger a disaster recovery policy (DRP)?
A. End user training B. Prior warning of impending harm C. Significant expenditure on avoiding single points of failure D. Performing full interruption testing
Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.
A. mobility B. network reliability C. installation costs D. security