Software forensics tools are commonly used to copy data from a suspect’s disk drive to a(n) ____.
A) backup file.
B) firmware.
C) image file.
D) recovery copy.
Answer: C) image file.
You might also like to view...
As more lines of text are typed than Word can display in the document window, Word _________________________ the top or bottom portion of the document off the screen.
Fill in the blank(s) with the appropriate word(s).
The Caption property:
A) allows additional information to display below the field name. B) displays a name for a field other than the field name. C) prohibits spaces within a field name. D) alters the name used in the Query Wizard.
The problems of running and scheduling processes are more complex on a networked system.
Answer the following statement true (T) or false (F)
EAM's allow auditors to identify significant transactions for substantive testing.
Answer the following statement true (T) or false (F)