_________ devices often pose special challenges to investigators because they can be configured to use advanced encryption and they can be wiped by the user even when the user is not present.
A. Portable
B. Desktop computer
C. Expansion
D. Satellite transceiver
Answer: A
Computer Science & Information Technology