Outline and explain the process used to preserve the verifiable integrity of digital evidence
What will be an ideal response?
Acquisition of data
Authentication of data
Imaging of the evidence drive
Wiping the analysis drive
Restoring
You might also like to view...
Which social network has become a popular site for online communities of al Qaeda sympathizers?
a. Facebook b. MySpace c. Tumbler d. Orkut
Which of the following was the leading reason people reported opposing the death penalty, according to a 2014 Gallup Poll?
A.It costs more to keep prisoners on death row. B.The death penalty does not deter people from committing murder. C.Persons may be wrongfully convicted. D.It is wrong to take a life.
Which of the following researchers contributed an important life-course orientation in their analysis of the gang behavior of Rochester youths as they aged into their young adult years?
A) Marvin D. Krohn and colleagues B) Terence Thornberry and colleagues C) J. Hodgkinson and colleagues D) Finn-Aage Esbensen and colleagues
Fingerprint and shoe print evidence are generally examples of _____ evidence
Fill in the blank(s) with correct word