This topic contains a solution. Click here to go to the answer

Author Question: Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ ... (Read 6322 times)

lb_gilbert

  • Hero Member
  • *****
  • Posts: 588

When transporting a hard disk that was extracted from a computer, what is the appropriate method of protecting the device during transport?


◦ Faraday bag
◦ Anti-static bag
◦ Sealed and properly labeled box
◦ Unless there is a vital reason for doing so, the hard disk should not be removed from the computer on site.


Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question

Capo

  • Hero Member
  • *****
  • Posts: 545

While investigating a person suspected of having child pornography on his machine, you discover that at the time the files first appeared on the system, another user was logged onto the system. This is a powerful piece of ________ evidence.





shofmannx20

  • Hero Member
  • *****
  • Posts: 562

Case notes that you take during initial response are protected from discovery because they are covered under the "work product" doctrine.


◦ true
◦ false




Evvie72

  • Hero Member
  • *****
  • Posts: 519

By transporting a cellular telephone in a Faraday bag, the device is protected from hackers getting onto the device and wiping it.


◦ true
◦ false




laurencescou

  • Hero Member
  • *****
  • Posts: 593

Computer scientists break the movement of information from raw electrical voltage changes to humanly readable information as a series of 
 abstraction layers. Which of the following is one of these abstraction layers?


◦ Voltage fluctuations
◦ Changes in magnetic energy on the surface of a hard disk
◦ Character sets
◦ Binary streams
◦ All of these




 

Did you know?

Before a vaccine is licensed in the USA, the Food and Drug Administration (FDA) reviews it for safety and effectiveness. The CDC then reviews all studies again, as well as the American Academy of Pediatrics and the American Academy of Family Physicians. Every lot of vaccine is tested before administration to the public, and the FDA regularly inspects vaccine manufacturers' facilities.

Did you know?

Dogs have been used in studies to detect various cancers in human subjects. They have been trained to sniff breath samples from humans that were collected by having them breathe into special tubes. These people included 55 lung cancer patients, 31 breast cancer patients, and 83 cancer-free patients. The dogs detected 54 of the 55 lung cancer patients as having cancer, detected 28 of the 31 breast cancer patients, and gave only three false-positive results (detecting cancer in people who didn't have it).

Did you know?

Hippocrates noted that blood separates into four differently colored liquids when removed from the body and examined: a pure red liquid mixed with white liquid material with a yellow-colored froth at the top and a black substance that settles underneath; he named these the four humors (for blood, phlegm, yellow bile, and black bile).

Did you know?

Many medications that are used to treat infertility are injected subcutaneously. This is easy to do using the anterior abdomen as the site of injection but avoiding the area directly around the belly button.

Did you know?

The average older adult in the United States takes five prescription drugs per day. Half of these drugs contain a sedative. Alcohol should therefore be avoided by most senior citizens because of the dangerous interactions between alcohol and sedatives.

For a complete list of videos, visit our video library