Using technology to search for computer evidence of a crime in order to retrieve information, even if it has been altered or erased, that can be used in pursuit of an attacker or criminal is an example of:

A. computer forensics
B. penetration testing
C. vulnerability testing
D. risk management


Answer: A

Computer Science & Information Technology

You might also like to view...

Which file stores information about which DNS servers the system uses?

What will be an ideal response?

Computer Science & Information Technology

When [blue] is listed as a format, all numbers display in blue

Indicate whether the statement is true or false.

Computer Science & Information Technology

A security advantage of VLANs is that they can be used to prevent direct communication between servers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A data model enables you to integrate data from only one source within an Excel workbook.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology