With the original evidence safely stored, you should make a(n) ________ of the forensic image
Fill in the blank(s) with correct word
working copy
Computer Science & Information Technology
You might also like to view...
A worksheet functions much like a visual computer.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.
A. ?firewall B. ?proxy C. ?virus D. ?digital signature
Computer Science & Information Technology