What do you call a forensics workstation consisting of a laptop computer with almost as many bays and peripherals as a stationary workstation?
a. A quasi-workstation
b. A field workstation
c. A lightweight workstation
d. A portable workstation
ANSWER: d
You might also like to view...
Which of the following statements is false?
a. Passing an object by value is good from a security standpoint because the called function has no access to the original object in the caller. b. Pass-by-reference can degrade performance when making a copy of a large object. c. An object can be passed by reference by passing either a pointer or a reference to the object. d. When an object is returned by value, a copy constructor copies the original object’s values into the new object.
Every Java application program must have
a. a class named MAIN b. a method named main c. at least two data types d. integer variables
Timestamping is
(a) used to provide proof that a message has been sent. (b) performed by a time stamping agency. (c) the process of binding a time and date to a digital document. (d) All of the above.
Which of the following techniques involves sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones and laptops?
A. Bluejacking B. Bluesmacking C. Bluebugging D. BluePrinting