Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?
I'm a little confused by the wording of the question. Are they asking about the specific type of evidence that can be used to infer a conclusion about malicious activity? I'll need to re-read this a few times to make sure I understand.
Okay, let me break this down. Corroborating evidence supports or confirms other evidence, circumstantial evidence implies a conclusion, direct evidence directly proves something, and incontrovertible evidence is undisputable. I think I've got this!
Hmm, I'm a bit unsure about the differences between the answer choices here. I'll need to think through the definitions of each type of evidence carefully.
I'm not totally confident, but I think option B, order processing, is the correct answer here. That seems to be the activity that matches the description in the question.
Two-factor authentication is a good security measure, but I don't think it's the best methodology for managing access rights on its own. I'll need to consider that in the broader context.
Val
3 months agoCheryll
3 months agoMarica
3 months agoMalinda
4 months agoDesiree
4 months agoKatie
4 months agoJospeh
4 months agoBenton
4 months agoRoyal
5 months agoGail
5 months agoArlette
5 months agoNoemi
5 months agoKina
5 months agoCherrie
5 months agoChi
5 months agoLeonard
1 year agoSunshine
1 year agoCheryll
1 year agoBlythe
1 year agoSophia
1 year agoCasandra
1 year agoErasmo
1 year agoCaprice
1 year agoWerner
1 year agoHaydee
1 year agoCasandra
2 years agoJeff
2 years agoGladys
1 year agoLashaunda
1 year agoEladia
1 year ago