What should you do when working on an Internet investigation and the suspect’s computer is on?

What will be an ideal response?


ANSWER: If you’re working on a network or Internet investigation and the computer is on, save data in any current applications as safely as possible and record all active windows or shell sessions. Don’t examine folders or network connections or press any keys unless it’s necessary. For systems that are powered on and running, photograph the screens. If windows are open but minimized, expanding them so that you can photograph them is safe. As a precaution, write down the contents of each window.

Computer Science & Information Technology

You might also like to view...

Rick prepared the following pseudocode for the count controlled iteration of a singly linked list using head and tail dummy nodes. In what way is this potentially misleading?

Pseudocode: count controlled iteration of a singly linked list w/dummy nodes 1. let cursor reference the first data node 2. count = 0 3. while count is less than length of the list 4. visit the node referenced by cursor 5. advance cursor to the next node 6. increment count

Computer Science & Information Technology

________ determine the amount of white space that displays at the top, bottom, left and right of the text in the document

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ____________________ selector applies the style rule to any list item (li) that appears in the unordered list that is marked with the id property of the list.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Data normalization groups data attributes into tables in accordance with specific design objectives.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology