Multiple Choice
Match each item with a statement below:
-yields information about how a perpetrator or an attacker gained access to a network
A) Computer forensics
B) Network forensics
C) Litigation
D) Xtree Gold
E) Case law
F) HTCIA
G) Affidavit
H) Industrial espionage
I) Line of authority
Correct Answer:

Verified
Correct Answer:
Verified
Q36: Match each item with a statement below:<br>-sworn
Q37: The _ provides a record of clues
Q38: Briefly describe the main characteristics of public
Q39: Maintaining _ means you must form and
Q40: Match each item with a statement below:<br>-investigates
Q42: The FBI _ was formed in 1984
Q43: What text can be used in internal
Q44: Briefly describe the main characteristics of private
Q45: In addition to warning banners that state
Q46: _ involves preventing data loss by using