Which of the following is not a unique characteristic of cloud computing relative to forensics?

A. All of these.
B. Evidence may be easier for multiple persons to tamper with or modify.
C. Evidence may be stored in binary code.
D. Evidence may be under different privacy rules.
E. Evidence may be in a different location than the suspect computer.

Answer: C. Evidence may be stored in binary code.

Computer Science & Information Technology

You might also like to view...

To make a new style available in other documents, in the Modify Style dialog box select the ________ option button

A) New documents based on this style B) New documents based on this template C) Use in all documents D) Use in other documents

Computer Science & Information Technology

The security administrator runs an rpm verify command which records the MD5 sum, permissions, and timestamp of each file on the system. The administrator saves this information to a separate server. Which of the following describes the procedure the administrator has performed?

A. Host software base-lining B. File snapshot collection C. TPM D. ROMDB verification

Computer Science & Information Technology