_________ devices often pose special challenges to investigators because they can be configured to use advanced encryption and they can be wiped by the user even when the user is not present.

A. Portable
B. Desktop computer
C. Expansion
D. Satellite transceiver


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

A. Ruby permits an existing class to be used as the basis for defining a new class B. Child classes must be identical to the parent class upon which they are based and cannot be further modified C. Custom classes can be used to model the creation of real life concepts D. All of the above

Computer Science & Information Technology

A macro-enabled workbook has an extension of ____.

A. xlsx B. xlsw C. xlsm D. xmac

Computer Science & Information Technology

Following someone through the door is an example of _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The MPDU exchange for distributing pairwise keys is known as the _________ which the STA and SP use to confirm the existence of the PMK, to verify the selection of the cipher suite, and to derive a fresh PTK for data sessions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology