Which of the following defines computer forensics?

a. It is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices.
b. It evaluates an organization’s security policy.
c. It detects viruses in a computer system and quarantines them.
d. It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.


a. It is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices.
Computer forensics is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law. A computer forensics investigation may be opened in response to a criminal investigation or civil litigation.

Computer Science & Information Technology

You might also like to view...

Match the following terms in the CFAA to their meanings

I. Protected computer A. Any impairment to the integrity of data II. Authorized access B. Includes the cost of conducting a damage assessment III. Damage C. Intentional, reckless, or negligent actions IV. Loss D. One that affects domestic or foreign commerce V. Conduct E. Required to obtain or alter information

Computer Science & Information Technology

Compare and contrast IPv4 addresses with IPv6 addresses

What will be an ideal response?

Computer Science & Information Technology

The ________ service began in September 2011, and enables users to take photos and record videos. The sender can set a time limit for when the picture or video disappears (1 to 10 seconds). From a forensics perspective, these images are often still present on the user's device even though the user thinks the file has been deleted

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To retrieve data from or make changes to a web page element, you must first write code that identifies the specific object you want to work with.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology