In digital forensics, all investigations follow the same basic methodology once permission for search and seizure has been obtained. Which of the following is NOT one of the elements of that process?
A. Analyze the data without risking modification or unauthorized access.
B. Report the findings to the proper authority.
C. Determine whether to "apprehend and prosecute."
D. Identify relevant EM.
Answer: C
You might also like to view...
Network administration includes hardware and software maintenance, support, and security.?
Answer the following statement true (T) or false (F)
James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away.What can James use to wipe the data clean? (Select TWO.)
A. Zero-fill utility B. Format the drive C. ATA Secure Erase D. Smash the USB drive
Suggest a strategies for building software to prevent deterioration due to change by matching the phrases
A. Documents developed in a timely mannered B. Have a backup person for C. Designer and customer D. Review works done E. Check whether risk aversion steps
A(n) ____ resume groups information by skills and accomplishments.
Fill in the blank(s) with the appropriate word(s).