Which AccessData feature compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data?
a. KFF
b. PKFT
c. NTI
d. NSRL
ANSWER: a
Computer Science & Information Technology
You might also like to view...
Markers can only be used with objects that move.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Near field communication allows two devices to share data by touching them together or bringing them close to each other
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.
a. hacker b. insider c. cracker d. script bunny
Computer Science & Information Technology
A field in a table can have ___________ data type(s).
a.) Only One B.) Two C.) Several D.) Many
Computer Science & Information Technology