Software forensics tools are commonly used to copy data from a suspect’s disk drive to a(n) ____.

A) backup file.
B) firmware.
C) image file.
D) recovery copy.


Answer: C) image file.

Computer Science & Information Technology

You might also like to view...

As more lines of text are typed than Word can display in the document window, Word _________________________ the top or bottom portion of the document off the screen.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Caption property:

A) allows additional information to display below the field name. B) displays a name for a field other than the field name. C) prohibits spaces within a field name. D) alters the name used in the Query Wizard.

Computer Science & Information Technology

The problems of running and scheduling processes are more complex on a networked system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

EAM's allow auditors to identify significant transactions for substantive testing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology