Which of the following is NOT considered an objective in ensuring probative information is recovered?
A) To protect the computer system during the actual investigation
B) To determine if steganography was used
C) To recover deleted, existing, hidden, and password protected files
D) To search for any and all malware that may have infected the system
D
Computer Science & Information Technology
You might also like to view...
________ can be categorized as white-hat, gray-hat, or black-hat
Fill in the blank(s) with correct word
Computer Science & Information Technology
A polymorphic method
a) has multiple implementations within the same class definition. b) is uniquely identified by the data types of its arguments. c) can be used in a subclass if it’s not used in a base class. d) has the same name as another method within the same class hierarchy.
Computer Science & Information Technology