What do you call a forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation?

a. A quasi-workstation
b. A field workstation
c. A lightweight workstation
d. A portable workstation


ANSWER: d

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Passing an object by value is good from a security standpoint because the called function has no access to the original object in the caller. b. Pass-by-reference can degrade performance when making a copy of a large object. c. An object can be passed by reference by passing either a pointer or a reference to the object. d. When an object is returned by value, a copy constructor copies the original object’s values into the new object.

Computer Science & Information Technology

Every Java application program must have

a. a class named MAIN b. a method named main c. at least two data types d. integer variables

Computer Science & Information Technology

Timestamping is

(a) used to provide proof that a message has been sent. (b) performed by a time stamping agency. (c) the process of binding a time and date to a digital document. (d) All of the above.

Computer Science & Information Technology

Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops?

A. Bluejacking B. Bluesmacking C. Bluebugging D. BluePrinting

Computer Science & Information Technology