There are two methods for attacking computers and our cyber infrastructure.
a. True
b. False
Question 2
Attorneys may file motions throughout the trial, but many motions to exclude are heard:
a. Prior to opening statements
b. Immediately after opening statements
c. During witness testimony
d. Closing arguments