A discarded credit card receipt or utility bill could be the starting point from which a perpetrator finds enough information to assume a victim's _______________
a. Identity
b. Password
c. Appearance
d. None of the above
Answer A.
You might also like to view...
Which of the following statements is false?
a. Storage of data variables and arrays is temporary. b. Data is lost when a local variable “goes out of scope.”. c. Files are used for long-term retention of large amounts of data. d. Data maintained in files is often called transient data.
When it’s not known in advance how many times a set of statements will be repeated, a(n) ________ value can be used to terminate the iteration.
Fill in the blank(s) with the appropriate word(s).
You are among the first onto a scene in which multiple computers are being seized. As a part of the festivities, you make take a number of digital photographs and a video recording tape of the scene. What primary collection of documentation hosts these images and videos?
a. The Case Timeline b. Procedural Documentation c. Chain of Custody d. General Case Documentation e. Process Documentation
What type of Windows file attribute prevents a file from being seen by other commands?
A. private B. archive C. system D. hidden