1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Levart [38]
3 years ago
14

Describe five ways in which Process Explorer (procexp) can be used in computer forensics as part of an investigation

Computers and Technology
1 answer:
nataly862011 [7]3 years ago
4 0

Answer:

 The process explorer is mainly used for tracking the actual problems in the system. Process explorer is also known as proc-exp and it is also used as system monitoring where it monitor the microsoft window that are typically created by the SysInternals.  

The following are the five ways in which the proc-exp (Process explorer) are used in the computer forensics for the purpose of investigation are:

  • The process explorer mainly provide the various types of functionality to the task manager for monitoring the system properly.
  • It basically used in the system for tracking the main problems.
  • It used in computer forensics for tracking the system problems and it give the detail information about the system memory also.
  • It keeps track all the virus and malicious software in the computer system.
  • It helps for investigation purpose as by using the process explorer we can get all the information about the particular computer system and software.  

You might be interested in
____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation
umka21 [38]

Answer:

b. Acceptance

Explanation:

<em>"Acceptance </em><em>of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.  </em><em>"</em>

<em>Acceptance Control </em>is important as a strategy when an organization has accomplished a determined level of risk, or it has estimated potential damages that might happen due to attacks, or the organization has developed a thorough analysis related to cost benefits, or it has also evaluated the probabilities of attacks.

7 0
3 years ago
Which of the following file formats allows you to share and save documents
mariarad [96]
OPTION A would be the answer
7 0
2 years ago
What is 11.2 rounded to the nearest one?​
klio [65]
Your answer is already in one decimal place. If you consider the whole number to one decimal place it would be rounded to just 10 since 0 doesn’t count for sig figs. Hope it helped
4 0
3 years ago
Read 2 more answers
generally, ( mouse,keyboard,hard disk,pen drive) can't be removed from the computer ? choose the correct answer​
artcher [175]

Answer:

Hard Disk

Explanation:

A very important part of a computer is the hard disk. It stores data and documents that users may have downloaded. Removing the hard disk could make the computer useless.

A mouse, keyboard, or pen drive can be easily removed.

A mouse and a pen drive are USB-connected devices and can be removed by simply unplugging the cable. A keyboard can be removed by simply taking off the keycaps. It is easily accessible.

-Chetan K

7 0
3 years ago
Read 2 more answers
When the hyper-v role is added to a windows server 2012 r2 server, what is loaded first during boot?
Naya [18.7K]
The <span>Hypervisor is loaded first.</span>
6 0
3 years ago
Other questions:
  • Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
    10·1 answer
  • Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
    6·1 answer
  • #Write a function called is_composite. is_composite should #take as input one integer. It should return True if the #integer is
    11·1 answer
  • To check spelling errors in a document, the Word application uses the _____ to determine appropriate spelling.
    7·2 answers
  • Which is a benefit of using the paste link option?
    15·2 answers
  • Draw AND, OR, XOR and XNOR gates with truth table and logic gates.<br><br>.​
    11·1 answer
  • Question
    5·1 answer
  • Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, an
    8·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!