With the original evidence safely stored, you should make a(n) ________ of the forensic image

Fill in the blank(s) with correct word

working copy

Computer Science & Information Technology

You might also like to view...

A worksheet functions much like a visual computer.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

A. ?firewall B. ?proxy C. ?virus D. ?digital signature

Computer Science & Information Technology