Name at least four subfunctions of the extraction function that are used in forensics investigations.

What will be an ideal response?


?The following subfunctions of extraction are used in investigations:Data viewingKeyword searchingDecompressing or uncompressingCarvingDecryptingBookmarking or tagging 

Computer Science & Information Technology

You might also like to view...

Configuring a linked server which enables a data source to be queried directly from within SQL Server works well for static data sources.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The term ____ refers to those who have mastered the firmware and software of modern computer systems, and enjoy the exploration and analysis of network security with no intent to intrude or cause harm.

A. cracker B. consultant C. hacker D. defender

Computer Science & Information Technology

A(n) ____________________ is a hardware device that produces output.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The actions performed by the JVM that take place with each method call are sometimes referred to as __________.

a. overhead b. allocation c. overflow d. retention

Computer Science & Information Technology