Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:
A. computer forensics
B. penetration testing
C. vulnerability testing
D. risk management
Answer: A
Computer Science & Information Technology
You might also like to view...
Which file stores information about which DNS servers the system uses?
What will be an ideal response?
Computer Science & Information Technology
When [blue] is listed as a format, all numbers display in blue
Indicate whether the statement is true or false.
Computer Science & Information Technology
A security advantage of VLANs is that they can be used to prevent direct communication between servers.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A data model enables you to integrate data from only one source within an Excel workbook.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology