Match each term with the correct statement below.

A. Involves reconstructing events that have already occurred for the purpose of documenting what happened through evidence
B. Electronic files that provide step-by-step descriptions of the events that took place during a computer incident
C. A legal concept involving assurance that evidence is correct and has not been tampered with while being handled
D. Analysis of physical components of a network
E. Mathematical process used to hide pictures or text
F. Crimes committed virtually from miles away from the actual scene of the crime
G. Request for and supplying of electronic evidence
H. Used to conduct testing processes and procedures
I. Original file format


A. Digital forensics competency
B. System logs
C. Chain of custody
D. Network forensics
E. Steganography
F. Uninvolved criminality
G. E-discovery
H. Forensic laboratories
I. Native

Computer Science & Information Technology

You might also like to view...

A(n) ________ marks a specific location on a line of text

Fill in the blank(s) with correct word

Computer Science & Information Technology

First normal form is a table that contains no repeating groups or repeating columns

Indicate whether the statement is true or false

Computer Science & Information Technology

You can click a state in the History panel to go back to that point of your work, and then continue working from that state.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ability to communicate with a device without using your hands is known as ________ computing.

A. cloud B. hands-free C. augmented D. wearable

Computer Science & Information Technology