_______ is not one of the functions of the investigations triad.

A. ?Digital investigations
B. ?Data recovery
C. ?Vulnerability/threat assessment and risk management
D. ?Network intrusion detection and incident response


Answer: B

Computer Science & Information Technology

You might also like to view...

Two or more procedures in an application may need to use the same variable or array.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Instead of maintaining a local server, a company may decide to use a(n) ________ server that is maintained by a hosting company and is connected to the network via the Internet

A) cloud B) database C) print D) application

Computer Science & Information Technology

The ____ signal continues a process that was stopped with the STOP signal.

A. SIGKILL B. SIGHUP C. SIGINT D. SIGCONT

Computer Science & Information Technology

The visual formatting model is based on the ____________________ structure of the HTML document and the element display type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology