Describe the different tools of law enforcement agencies for investigating computer crimes and analyze which one is most applicable for current technological developments
What will be an ideal response?
Answer should include the following points:
Tools:
• Packet sniffing
• Keyloggers
• Data mining
You might also like to view...
Polymorphism allows for specifics to be dealt with during:
a. execution. b. compilation. c. programming. d. debugging.
________ are a set of content controls that work with earlier versions of Word
Fill in the blank(s) with correct word
VBA is used to write computer programs in the ________ environment
Fill in the blank(s) with correct word
When using Group Policy to configure QoS, what options are available? (Choose all that apply)
a. the priority is a number from 0 and 63 b. outbound traffic can be throttled c. you must choose a specific application to apply the policy d. you can choose the protocol (either IP or ICMP) for the polic