As an experienced digital investigator, you have been called in to testify about the reliability of the tool that was used to extract a forensic image. In your testimony you explain that you tested the utility against several _________________.

a. Captured suspect drives
b. Virtual drives
c. Known data sets
d. Archived image files


c. Known data sets

Computer Science & Information Technology

You might also like to view...

Which of the following is not a class UIManager method?

a. LookAndFeelInfo(). b. getInstalledLookAndFeels(). c. setLookAndFeel(). d. getLookAndFeel().

Computer Science & Information Technology

What is the network name to which the host belongs?

A. Domain name B. Hostname C. Homename D. Host

Computer Science & Information Technology

In VBA, a(n) ________ is a group of objects that have similar characteristics

Fill in the blank(s) with correct word

Computer Science & Information Technology

A B-tree search algorithm must return the address of the located node and ____.

A. its contents B. its parent address C. the entry that contains the target D. the number of entries in the node

Computer Science & Information Technology