The process of ____ typically involves the generation of a forensically sound copy of the evidence for the purpose of analysis.

A. data access
B. data collection
C. data retention
D. data classification


Answer: B

Computer Science & Information Technology

You might also like to view...

A user can use ________ to view how a table will print before committing

A) Print Preview B) Zoom C) Page Layout D) Design

Computer Science & Information Technology

Why should you format data in Excel?

What will be an ideal response?

Computer Science & Information Technology

__________ enables software written for a different platform to run, but does not virtualize hardware.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following are digital audio-only formats? (Select TWO).

A. AAC B. WMV C. WMA D. AVI E. DES

Computer Science & Information Technology