Multiple Choice
In any computing investigation, you should be able to repeat the steps you took and produce the same results. This capability is referred to as ____.
A) checked values
B) verification
C) evidence backup
D) repeatable findings
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q16: _ investigations typically include spam, inappropriate and
Q17: Use _ to secure and catalog the
Q18: A bit-stream image is also known as
Q19: Describe the process of creating a bit-stream
Q20: Describe some of the technologies used with
Q22: When you are dealing with password protected
Q23: What are the differences between computer forensics
Q24: _ prevents damage to the evidence as
Q25: Forensics tools such as _ can retrieve
Q26: A bit-stream copy is a bit-by-bit duplicate