CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 12

____ is the determination of the initial flaw or vulnerability that allowed an incident to occur. • Question 37 Most digital forensic teams have a prepacked field kit, also known as a(n) ____. • Question 38 Many private sector organizations require a formal statement, called a(n) ____, which provides search authorization and furnishes much of the same information usually found in a public sector search warrant. • Question 39 One way to identify a particular digital item (collection of bits) is by means of a(n) ____. • Question 40