1
We work on the system image to avoid .................. of evidence
2
The first step of desktop forensics is device ...........................
3
forensic .......... tools, used to gather further information about cyber evidence
4
Type of data that is lost after you power down a machine
5
............. files are examined to find evidence of malware and other key identifiers of a cyber attack
6
system ................ : A copy of an affected HDD
7
....... activity, shows who has logged in, what web pages were visited, etc.