Also known as "items of potential evidentiary value," any information that could potentially support the organization's legal or policy-based case against a suspect is known as _________.
A. evidentiary material
B. digital forensics
C. evidence
D. e-discovery
Answer: A
You might also like to view...
Which statement is false?
a. With datagram sockets a process establishes a connection to another process. b. The TCP protocol is used for transmission with stream sockets. c. The UDP protocol is used for transmission with datagram sockets. d. With the UDP protocol packets can be lost, duplicated or even arrive out of sequence.
The combination of the disk drive plus the complete hierarchy of directories in which a file resides is its ____.
A. pointer B. path C. locator D. stream
A class that uses an interface must use the keyword:
a. Extends b. Inherits c. Super d. Implements
________ is any combination of letters, numbers, etc NOT used for calculations
Fill in the blank(s) with correct word