To protect original data from any alteration, you
A) Do your forensic work as quickly as possible
B) Make a forensic copy of the original data
C) Use the operating system to copy all relevant files
D) Use gloves when working with the hard drive
B
You might also like to view...
Which of the following is NOT a cyber crime against persons and property?
A. Online consumer fraud B. Spam C. Cyber theft D. Cyberstalking
Identify and list those persons who were critical to the early development of probation and parole.
What will be an ideal response?
Ben takes out his wallet and extracts money to pay a taxi fare. He inadvertently leaves his wallet on the seat. The cab driver finds it and decides to keep it. This is:
a. lost property, so there is no theft. b. abandoned property, so there is no theft. c. mislaid property, so this is the subject of larceny. The taxi driver has committed the theft. d. none of the above
Prosecutors in Alabama argued that Watson planned the alleged murder of his wife in Alabama and therefore the state had jurisdiction over the crime
a. geographic b. territorial c. limited d. concurrent