Icon Crear Crear
Obtener Plan Académico
Obtener Plan Académico
Obtener Plan Académico

Computer Forensics Revision 01

Crucigrama

(2)
For September 2022 semester.

Descarga la versión para jugar en papel

Edad recomendada: 18 años
16 veces realizada

Creada por

Malasia

Top 10 resultados

  1. 1
    05:25
    tiempo
    100
    puntuacion
  2. 2
    15:00
    tiempo
    40
    puntuacion
  3. 3
    ddd
    ddd
    02:08
    tiempo
    16
    puntuacion
¿Quieres aparecer en el Top 10 de este juego? para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Crucigrama

Computer Forensics Revision 01Versión en línea

For September 2022 semester.

por Aidora Abdullah
1

Cyber forensics activities include the __________ of computer-based information to courts of law.

2

A __________ incident team structure is a distributed team, whereby the central team provides guidance and advice, but does not have authority over the teams.

3

The characteristic of digital evidence known as __________ refers to the point that evidence must be related to the fact being proved.

4

Corporate _________ is the selling sensitive or proprietary company information to a competitor.

5

________ network vulnerabilities occur due to the over-extension of bandwidth and bottlenecks.

6

On a Windows machine, the index.dat file is used by the Internet Explorer web browser as an active __________, which runs as long as a user is logged on Windows.

7

A search __________ is a legal document authorizing a police officer or other official to enter and search premises.

8

Email _________ is the act of sending huge volumes of emails to an address in an attempt to overflow the mailbox where the email address is hosted to cause a denial of service attack.

9

With regards to image files forensics, __________ graphics use geometrical primitives such as points, lines and curves; which are all based upon mathematical equations to represent images in the computer.

10

__________ passwords can present a significant barrier when digital investigators need to boot a computer from a floppy disk to collect evidence from a computer.

5
6
7
8
2
3
1
10
9
educaplay suscripción