CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 7
Many private sector organizations require a formal statement,
called a(n) ____, which provides search authorization and furnishes
much of the same information usually found in a public sector search
warrant.
•
Question 39
One way to identify a particular digital item (collection of
bits) is by means of a(n) ____.
•
Question 40
The ____ phase of forensic analysis involves the use of
forensic tools to recover the content of files that were deleted,
operating system artifacts (such as event data and logging of user
actions), and other relevant facts.
•
Question 41
Because it is possible for investigators to confuse the suspect
and destination disks when performing imaging, and to preclude any
grounds for challenging the image output, it is common practice to
protect the suspect media using a ____.
•
Question 42
If a user receives a message whose tone and terminology
seems intended to invoke a panic or sense of urgency, it may be a(n)
____.
•
Question 43
When an incident includes a breach of physical security, all
aspects of physical security should be escalated under a containment
strategy known as ____.
•
Question 44