Also known as "items of potential evidentiary value," any information that could potentially support the organization's legal or policy-based case against a suspect is known as _________.

A. evidentiary material
B. digital forensics
C. evidence
D. e-discovery


Answer: A

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. With datagram sockets a process establishes a connection to another process. b. The TCP protocol is used for transmission with stream sockets. c. The UDP protocol is used for transmission with datagram sockets. d. With the UDP protocol packets can be lost, duplicated or even arrive out of sequence.

Computer Science & Information Technology

The combination of the disk drive plus the complete hierarchy of directories in which a file resides is its ____.

A. pointer B. path C. locator D. stream

Computer Science & Information Technology

A class that uses an interface must use the keyword:

a. Extends b. Inherits c. Super d. Implements

Computer Science & Information Technology

________ is any combination of letters, numbers, etc NOT used for calculations

Fill in the blank(s) with correct word

Computer Science & Information Technology