Question 28
1 / 1 pts
Digital forensics can be used for two key purposes: ________ or _________.
e-discovery; to perform root cause analysis
Correct!
to investigate allegations of digital malfeasance; to
perform root cause analysis
to solicit testimony; to perform root cause analysis
to investigate allegations of digital malfeasance; to solicit
testimony
Question 29
1 / 1 pts
In digital forensics, all investigations follow the same basic methodology once
permission to search and seize is received, beginning with _________.
Correct!
identifying relevant items of evidentiary value
acquiring (seizing) the evidence without alteration or damage
analyzing the data without risking modification or unauthorized access
investigating allegations of digital malfeasance
Question 30
1 / 1 pts
_________ devices often pose special challenges to investigators because they
can be configured to use advanced encryption and they can be wiped by the user even when the user is not present.
Correct!
Portable
Desktop computer
Expansion