Multiple Choice
____ uses technology to search for computer evidence of a crime, can attempt to retrieve information-even if it has been altered or erased-that can be used in the pursuit of the attacker or criminal.
A) Computer forensics
B) Penetration testing
C) Vulnerability testing
D) Risk management
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: A subset of business continuity planning and
Q18: Duplicate image backups are considered a primary
Q20: Describe the purpose of a disaster recovery
Q31: _ data is the most difficult type
Q32: A _ is a component or entity
Q33: A(n) _ backup is an evidence-grade backup
Q35: The air-handling space above drop ceilings (and
Q37: Most metadata about a file is generated
Q40: A _ is a snapshot of the
Q41: _ is data about data.