_________ devices often pose special challenges to investigators because they can be configured to use advanced encryption and they can be wiped by the user even when the user is not present.

A. Portable
B. Desktop computer
C. Expansion
D. Satellite transceiver

Answer: A

Computer Science & Information Technology

You might also like to view...

Arranging the patients in a dental data source by patient's ages is an example of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is IPv6?

What will be an ideal response?

Computer Science & Information Technology