Computer ________ involves identifying, extracting, preserving, and documenting computer evidence.
A. forensics
B. hacking
C. inoculation
D. multi-factor authentication
Answer: A
Computer Science & Information Technology
You might also like to view...
The RunMacro action cannot be used to run a macro from within another macro
Indicate whether the statement is true or false
Computer Science & Information Technology
Many brushes on the Brush panel have been designed with Shape Dynamics as their default setting.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Outlines, Shadow, Reflections, and Glow are options in the ________ gallery
A) Themes B) Text Effects C) Column Styles D) Styles
Computer Science & Information Technology
Text that has been encrypted is called ____.
A. ciphertext B. plaintext C. cryptotext D. cryptography
Computer Science & Information Technology