Multiple Choice
A common technique that is highly useful and can be applied in a computer intrusion investigation is to simply focus on file system activities around the time of known events. This embodies a principle known as:
A) Temporal proximity
B) Timeline analysis
C) File system analysis
D) Temporal aggregation
Correct Answer:

Verified
Correct Answer:
Verified
Q7: If digital investigators find an unauthorized file,
Q8: Incident Response can be viewed as a
Q9: Gathering information about a system through the
Q10: Remote forensic solutions can be used to
Q11: In the case of a computer intrusion,
Q13: Although new exploits are published daily, it
Q14: Social engineering refers to any attempt to
Q15: The forensic examiner needs to be aware
Q16: Examining a live system is prone to
Q17: Determining skill level can lead to:<br>A) Determining