Aside from a live memory capture taken at the time of first response, what are two locations on a computer where copies of previous memory configurations can be found?

a. Cache
b. Hybernation files
c. The registry
d. .DMP files


b. Hybernation files
d. .DMP files

Computer Science & Information Technology

You might also like to view...

Your management team is deciding on a new allocation of computers. If there are more than 15 employees in an office, you will allocate 10 computers. If there are between 10 and 14 employees, you will allocate 8 computers. If there are fewer than 10 employees, you will allocate 5 computers. You have a table that contains each location's employment numbers. What is the best Access function to use

for this allocation? A) IIF function B) Payment function C) Future Value function D) Nested IIF function

Computer Science & Information Technology

Adware is a type of spyware

Indicate whether the statement is true or false

Computer Science & Information Technology

Using Windows Firewall with Advanced Security default inbound, outbound, and connection security rules are provided; you can modify these rules or create new rules as required

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is the assurance that an identity to some computerized transaction is not an impostor.

A. Authentication B. Identity C. Authorization D. Entity

Computer Science & Information Technology