Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and root cause analysis are known as _________.
A. digital forensics
B. criminal investigation
C. crime scene investigation
D. e-discovery
Answer: A
You might also like to view...
To create a 3-D object, you first produce a line drawing called a ____.
A. frame B. line draw C. wireframe D. blueprint
A ________ key is a field that contains a nonrepeating value, which uniquely identifies each record
A) foreign B) primary C) secondary D) common
In Project 2013's Entry table, the location where the name of each task is entered is in the ________ column
A) Task Name B) Quick Access C) Task Mode D) Indicators
Even when a(n) __________ is at the correct size for your web page, it's often possible to reduce the file size by reducing its quality in a way that humans can't perceive, a process known as optimization.
Fill in the blank(s) with the appropriate word(s).