Match the following questions to their considerations

I. What am I looking for? A. Identify the operating system or network topology
II. What is the skill level of the user? B. There may be fingerprints or other trace evidence
III. What kind of hardware is involved? C. You would use different tools to locate different
items such as photographs or spreadsheets
IV. Do I need to preserve other evidence? D. This determines how you will extract the data
V. What is the computer environment? E. The more skilled the user, the more likely it
is that he can alter or destroy evidence


C E D B A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Each activation frame contains all the function’s code, as well as the automatic variables and formal parameters. 2. The activation frames in nested function calls are handled in a last-in/ first-out order. 3. A binary search works with any array of numbers. 4. For the binary search in the text to work, the element searched for must actually be present in the array.

Computer Science & Information Technology

Which of the following is NOT a shape included on an entity relationship diagram?

A) rectangle B) triangle C) diamond D) oval

Computer Science & Information Technology

Which of the following set the direction and scope of the security process and provide detailed instruction for its conduct?

A. system controls B. technical controls C. operational controls D. managerial controls

Computer Science & Information Technology

What is scalability?

What will be an ideal response?

Computer Science & Information Technology