A process focused on the identification and location of potential evidence related to a specific legal action after it was collected through digital forensics is known as _________.

A. e-discovery
B. forensics
C. indexing
D. root cause analysis


Answer: A

Computer Science & Information Technology

You might also like to view...

MC The __class__ attribute is a special attribute of a(n)______ .

a) object of a class. b) object reference. c) class. d) None of the above.

Computer Science & Information Technology

The length of a string can be determined by ________.

a. the String method length() b. the String instance variable length c. the String method strlen() d. All of the above.

Computer Science & Information Technology

Other than implementing preventative measures and planning out response and recovery strategies, what is another important element that will help minimize data loss in the event of a harmful event that would trigger a disaster recovery policy (DRP)?

A. End user training B. Prior warning of impending harm C. Significant expenditure on avoiding single points of failure D. Performing full interruption testing

Computer Science & Information Technology

Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.

A. mobility B. network reliability C. installation costs D. security

Computer Science & Information Technology