A security administrator working for a law enforcement organization is asked to secure a computer system at the scene of a crime for transport to the law enforcement forensic facility. In order to capture as mush evidence as possible, the computer system has been left running. The security administrator begins information by image which of the following system components FIRST?

A. NVRAM
B. RAM
C. TPM
D. SSD


Answer: B. RAM

Computer Science & Information Technology

You might also like to view...

If the desired Object is not found, binarySearch returns __________.

a. a positive value b. zero c. a negative value d. an ObjectNotFoundError.

Computer Science & Information Technology

Alan Turing is known for developing ________

A) the Analytical Engine B) punch cards for use in his loom C) a test that tests a machine's ability to display intelligent behavior D) programming

Computer Science & Information Technology

The ____ of a heap is guaranteed to hold the largest node in the tree.

A. head B. root C. right-most leaf D. left-most leaf

Computer Science & Information Technology

Using Adobe ____ technology, Dreamweaver can import Microsoft Office or other software webpages and delete the unused code.

A. Roundtrip B. Transportation C. Graphics D. Journey

Computer Science & Information Technology