1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
2 years ago
6

Case Project 13-3 A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s att

orney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.
Computers and Technology
1 answer:
kkurt [141]2 years ago
6 0

Answer:

idk

Explanation:

You might be interested in
1. What does the word “processing” in data pro- cessing mean?
blsea [12.9K]

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

6 0
2 years ago
Read 2 more answers
How many currencies do recognize?
klemol [59]
The United Nations currently recognizes 180 currencies that are used in 195 countries across the world the United States dollar is a popular currency and about 66 countries either peg their currency to the US dollar or use it as their currency
3 0
3 years ago
The four smallest numbers (40 points) Write an ANNA assembly program (smallest_four.ac) that finds the four smallest numbers ent
kari74 [83]

Answer:

the answer is -25

Explanation:

6 0
2 years ago
Anyone help me please​
MissTica

Answer:

1. True

2. False

3. True

4. False

5. True

6. True

7. False

4 0
3 years ago
Read 2 more answers
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Other questions:
  • How can i use css/html coding to create links
    15·1 answer
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • What is a computer briage coures​
    15·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • What is the term used to describe a computer system that can store literary documents, link them according to logical relationsh
    5·1 answer
  • Which is an example of synchronous communication?
    9·2 answers
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • Your first submission for the CIS 210 Course Project should include the following functionality: - Requests the user to input hi
    13·1 answer
  • I will mark you as brainlist
    10·2 answers
  • Plsssssssss help me​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!