Which of the following forensic workstations is designed as a somewhat portable device?

a. FRED
b. Forensic Analyst
c. FREDDIE
d. The Ultimate Forensic Machine


c. FREDDIE

Computer Science & Information Technology

You might also like to view...

The two types of information reconnaissance are ____.

A. internal and external B. static and dynamic C. open and closed D. passive and active

Computer Science & Information Technology

To demote an item in a multilevel list, click the Decrease Indent button

Indicate whether the statement is true or false

Computer Science & Information Technology

Identify which ________ should be used when creating an index

A) tabs B) page numbers C) terms D) bookmarks

Computer Science & Information Technology

Which of the following packets will be permitted in an extended IP ACL using the access-list statement access-list 101 permit ip host 1.1.1.1 ne 80 host 2.2.2.2 ne 80?

A) Any packet from host 1.1.1.1 with a source port other than 80 will be allowed to host 2.2.2.2 as long as the destination port is not 80. B) Any packet from host 1.1.1.1 with a source port of 80 will be allowed to host 2.2.2.2 as long as the destination port is 80. C) Any packet from host 2.2.2.2 with a source port other than 80 will be allowed to host 1.1.1.1 as long as the destination port is not 80. D) Any packet from host 2.2.2.2 with a source port of 80 will be allowed to host 1.1.1.1 as long as the destination port is 80.

Computer Science & Information Technology