CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 11
Cross-training provides a mechanism to get everyone out of the
crime scene and thus prevent contamination of possible evidentiary
material.
•
Question 33
The ____ handles computer crimes that are categorized as
felonies.
•
Question 34
The forensic tool ____ does extensive pre-processing of evidence
items that recovers deleted files and extracts e-mail messages.
•
Question 35
____ is used both for intrusion analysis and as part of evidence
collection and analysis.
•
Question 36