Which AccessData feature compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data?

a. KFF
b. PKFT
c. NTI
d. NSRL


ANSWER: a

Computer Science & Information Technology

You might also like to view...

Markers can only be used with objects that move.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Near field communication allows two devices to share data by touching them together or bringing them close to each other

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) _____ is a computer savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files or programs, or even transfer money.

a. hacker b. insider c. cracker d. script bunny

Computer Science & Information Technology

A field in a table can have ___________ data type(s).

a.) Only One B.) Two C.) Several D.) Many

Computer Science & Information Technology