Answer:
computer is used to create a voucher document
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
They fall under the category of “Photo Editing Software” or “Image Manipulation Software”
Explanation:
Recovery phase is the last phase in any disaster recovery process.
According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.
Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.