New Activity
Play Crossword Puzzle
1 We work on the system image to avoid .................. of evidence
2 The first step of desktop forensics is device ...........................
3 forensic .......... tools, used to gather further information about cyber evidence
4 Type of data that is lost after you power down a machine
5 ............. files are examined to find evidence of malware and other key identifiers of a cyber attack
6 system ................ : A copy of an affected HDD
7 ....... activity, shows who has logged in, what web pages were visited, etc.
2
4
3
1
7
6
5