match the definitions below by typing in a word or phrase from the list below exactly as it appears (think of it as scripting practice!). a. restored image b. trace evidence c. protected computer d. promiscuous mode e. do no harm f. ecpa g. snort machine h. intrusion detection i. off-line analysis j. rootkit k. evidence media l. transactional mode m. operational mode