A computer forensics expert has been asked to collect evidence from an individual’s workstation. The collection techniques used by the computer forensics expert should include all of the following EXCEPT:

a. Examination of the running system
b. Physical examination
c. Examination of surroundings
d. Collection of fingerprints


d. Collection of fingerprints

Computer Science & Information Technology

You might also like to view...

As with other Web pages, your report must be in ____ format to be accessible to Web browsers.

A. JavaScript B. ActiveX C. HTML D. FTP

Computer Science & Information Technology

In Internet Explorer 11, ________ provide quick access to the sites you save for later use

Fill in the blank(s) with correct word

Computer Science & Information Technology

The _______ scanner component creates light to reflect off the document

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which Access database object asks a question about the data stored in a database and displays specific fields and records that answer the question?

A. form B. table C. query D. report

Computer Science & Information Technology