1
Cyber forensics activities include the __________ of computer-based information to courts of law.
2
A __________ incident team structure is a distributed team, whereby the central team provides guidance and advice, but does not have authority over the teams.
3
The characteristic of digital evidence known as __________ refers to the point that evidence must be related to the fact being proved.
4
Corporate _________ is the selling sensitive or proprietary company information to a competitor.
5
________ network vulnerabilities occur due to the over-extension of bandwidth and bottlenecks.
6
On a Windows machine, the index.dat file is used by the Internet Explorer web browser as an active __________, which runs as long as a user is logged on Windows.
7
A search __________ is a legal document authorizing a police officer or other official to enter and search premises.
8
Email _________ is the act of sending huge volumes of emails to an address in an attempt to overflow the mailbox where the email address is hosted to cause a denial of service attack.
9
With regards to image files forensics, __________ graphics use geometrical primitives such as points, lines and curves; which are all based upon mathematical equations to represent images in the computer.
10
__________ passwords can present a significant barrier when digital investigators need to boot a computer from a floppy disk to collect evidence from a computer.