CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 12
____ is the determination of the initial flaw or vulnerability that
allowed an incident to occur.
•
Question 37
Most digital forensic teams have a prepacked field kit, also
known as a(n) ____.
•
Question 38
Many private sector organizations require a formal statement,
called a(n) ____, which provides search authorization and furnishes
much of the same information usually found in a public sector search
warrant.
•
Question 39
One way to identify a particular digital item (collection of bits) is
by means of a(n) ____.
•
Question 40