Match the following questions to their considerations
I. What am I looking for? A. Identify the operating system or network topology
II. What is the skill level of the user? B. There may be fingerprints or other trace evidence
III. What kind of hardware is involved? C. You would use different tools to locate different
items such as photographs or spreadsheets
IV. Do I need to preserve other evidence? D. This determines how you will extract the data
V. What is the computer environment? E. The more skilled the user, the more likely it
is that he can alter or destroy evidence
C E D B A
You might also like to view...
If you want a class that implements the Set interface and do not need any methods beyond those in the Set interface, you can use the concrete class:
a. Vector
____________________ list arrows automatically appear in the column header cells when you create a table.
Fill in the blank(s) with the appropriate word(s).