There are a few advanced search models that some of the more sophisticated tools use that allow the investigator to dig up very specific types of evidence. Which of the following are examples of an advanced email search?
a. Stationary User Profile
b. Domain Replication
c. Communications Frequency
d. Similar Users
a. Stationary User Profile
d. Similar Users
Computer Science & Information Technology
You might also like to view...
If Sam wants the filenames that are scrolling across his screen to momentarily stop so he can read them, the command he should use is
A) DIR /P B) DIR /W C) DIR /C D) DIR +R
Computer Science & Information Technology
The size of the ____________________ space in a security plan is typically dictated by the security resources that are available and the required level of security.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology