When working with Windows systems, what is the RID of the true administrator account?
You should make at least how many bit-stream copies of a suspect drive?
When investigating a potential e-mail crime, what is your first step in the investigation?