Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.

A. forensics
B. hacking
C. inoculation
D. multi-factor authentication


Answer: A

Computer Science & Information Technology

You might also like to view...

The RunMacro action cannot be used to run a macro from within another macro

Indicate whether the statement is true or false

Computer Science & Information Technology

Many brushes on the Brush panel have been designed with Shape Dynamics as their default setting.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Outlines, Shadow, Reflections, and Glow are options in the ________ gallery

A) Themes B) Text Effects C) Column Styles D) Styles

Computer Science & Information Technology

Text that has been encrypted is called ____.

A. ciphertext B. plaintext C. cryptotext D. cryptography

Computer Science & Information Technology