Multiple Choice
Match the following questions to their considerations.
-What kind of hardware is involved?
A) Identify the operating system or network topology
B) There may be fingerprints or other trace evidence
C) You would use different tools to locate different items such as photographs or spreadsheets
D) This determines how you will extract the data
E) The more skilled the user, the more likely it is that he can alter or destroy evidence
Correct Answer:

Verified
Correct Answer:
Verified
Q8: Forensic investigators establish generally accepted policies and
Q9: Match the type of file with the
Q10: If you encounter files that have been
Q11: Match the following tasks to the proper
Q12: Match the following questions to their considerations.
Q14: Match the type of file with the
Q15: When should the process of documenting e-evidence
Q16: Which of the following is NOT an
Q17: Match the following terms to their reporting
Q18: A(n)_ examination involves searches of the areas