A computer forensics expert has been asked to collect evidence from an individual’s workstation. The collection techniques used by the computer forensics expert should include all of the following EXCEPT:
a. Examination of the running system
b. Physical examination
c. Examination of surroundings
d. Collection of fingerprints
d. Collection of fingerprints
Computer Science & Information Technology
You might also like to view...
As with other Web pages, your report must be in ____ format to be accessible to Web browsers.
A. JavaScript B. ActiveX C. HTML D. FTP
Computer Science & Information Technology
In Internet Explorer 11, ________ provide quick access to the sites you save for later use
Fill in the blank(s) with correct word
Computer Science & Information Technology
The _______ scanner component creates light to reflect off the document
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which Access database object asks a question about the data stored in a database and displays specific fields and records that answer the question?
A. form B. table C. query D. report
Computer Science & Information Technology