CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 11

Cross-training provides a mechanism to get everyone out of the crime scene and thus prevent contamination of possible evidentiary material. • Question 33 The ____ handles computer crimes that are categorized as felonies. • Question 34 The forensic tool ____ does extensive pre-processing of evidence items that recovers deleted files and extracts e-mail messages. • Question 35 ____ is used both for intrusion analysis and as part of evidence collection and analysis. • Question 36