Which of the following is NOT considered an objective in ensuring probative information is recovered?

A) To protect the computer system during the actual investigation
B) To determine if steganography was used
C) To recover deleted, existing, hidden, and password protected files
D) To search for any and all malware that may have infected the system


D

Computer Science & Information Technology

You might also like to view...

________ is one term used for etiquette for the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ used for protecting a network may be created using routers.

A. Switches B. Firewalls C. Terminators D. Hubs

Computer Science & Information Technology

When you rasterize a type layer, you convert it from "live" type-type that is selectable and editable-to pixels.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the reason for making a form read-only?

A) Users can lookup information but not modify the data B) Users can lookup and edit forms as needed C) Users can use the form instead of the table to edit data D) Users can add and delete data from the form

Computer Science & Information Technology