Also known as "items of potential evidentiary value," any information that could potentially support the organization's legal or policy-based case against a suspect is known as _________.
A. evidentiary material
B. digital forensics
C. evidence
D. e-discovery
Answer: A
You might also like to view...
A class that uses an interface must use the keyword:
a. Extends b. Inherits c. Super d. Implements
Which statement is false?
a. With datagram sockets a process establishes a connection to another process. b. The TCP protocol is used for transmission with stream sockets. c. The UDP protocol is used for transmission with datagram sockets. d. With the UDP protocol packets can be lost, duplicated or even arrive out of sequence.
________ is any combination of letters, numbers, etc NOT used for calculations
Fill in the blank(s) with correct word
The combination of the disk drive plus the complete hierarchy of directories in which a file resides is its ____.
A. pointer B. path C. locator D. stream