You have been called to the scene of a crime. One of the rooms on the premises has been set up as a small home office. The computer is running, You have a warrant to seize the computer, so your team gets ready to pack it up and haul it away. What is the proper approach?

a. Leave the device running until a determination is made whether or not to capture live memory.
b. Pull the plug. You want to keep temporary files intact.
c. The lead investigator has determined there will be no need for live memory capture. So you gracefully shut the machine down in order to avoid corrupting the OS.
d. You never move the computer system until after it has been imaged.


a. Leave the device running until a determination is made whether or not to capture live memory.

Computer Science & Information Technology

You might also like to view...

An external style sheet is included by adding the link elementto the document head, where ______is the URL of the external style sheet file.

A. stylesheet B. text/css C. url D. href

Computer Science & Information Technology

List the eight steps in the user centered development methodology. For each step, include a sentence or two of description.

What will be an ideal response?

Computer Science & Information Technology

When you download a file and Office 2016 considers the source location of the file to be risky, it will automatically open the file in ________ View

A) Save B) Restricted C) Protected D) Lock

Computer Science & Information Technology

A following shot is a shot taken by a camera that is following a moving subject.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology