The first step in the preparation of any warrant application for a computer investigation is the operationalization of the crime and, more specifically, defining the role of the ________ in it

a. investigator
b. suspect
c. computer
d. police


Answer: c

Computer Science & Information Technology

You might also like to view...

The terms Monoblock and Speedlight mean the same thing. True or False?

Indicate whether the statement is true or false

Computer Science & Information Technology

By default Ubuntu uses the ____ file system

A) HFS+ B. NTFS C. exFat D. ext4

Computer Science & Information Technology

As an experienced digital investigator, you have been called in to testify about the reliability of the tool that was used to extract a forensic image. In your testimony you explain that you tested the utility against several _________________

a. Captured suspect drives b. Virtual drives c. Known data sets d. Archived image files

Computer Science & Information Technology

__________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used

a. File Server Resource Manager (FSRM) b. Distributed File System (DFS) c. Data Deduplication d. Services for Network File System (NFS)

Computer Science & Information Technology