In digital forensics, all investigations follow the same basic methodology once permission for search and seizure has been obtained. Which of the following is NOT one of the elements of that process?

A. Analyze the data without risking modification or unauthorized access.
B. Report the findings to the proper authority.
C. Determine whether to "apprehend and prosecute."
D. Identify relevant EM.


Answer: C

Computer Science & Information Technology

You might also like to view...

Network administration includes hardware and software maintenance, support, and security.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away.What can James use to wipe the data clean? (Select TWO.)

A. Zero-fill utility B. Format the drive C. ATA Secure Erase D. Smash the USB drive

Computer Science & Information Technology

Suggest a strategies for building software to prevent deterioration due to change by matching the phrases 

A. Documents developed in a timely mannered B. Have a backup person for C. Designer and customer D. Review works done E. Check whether risk aversion steps

Computer Science & Information Technology

A(n) ____ resume groups information by skills and accomplishments.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology