This topic contains a solution. Click here to go to the answer

Author Question: Deciding how to destroy evidentiary materials that is no longer needed falls under the ________ ... (Read 6321 times)

lb_gilbert

  • Hero Member
  • *****
  • Posts: 588

When transporting a hard disk that was extracted from a computer, what is the appropriate method of protecting the device during transport?


◦ Faraday bag
◦ Anti-static bag
◦ Sealed and properly labeled box
◦ Unless there is a vital reason for doing so, the hard disk should not be removed from the computer on site.


Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question

Capo

  • Hero Member
  • *****
  • Posts: 545

While investigating a person suspected of having child pornography on his machine, you discover that at the time the files first appeared on the system, another user was logged onto the system. This is a powerful piece of ________ evidence.





shofmannx20

  • Hero Member
  • *****
  • Posts: 562

Case notes that you take during initial response are protected from discovery because they are covered under the "work product" doctrine.


◦ true
◦ false




Evvie72

  • Hero Member
  • *****
  • Posts: 519

By transporting a cellular telephone in a Faraday bag, the device is protected from hackers getting onto the device and wiping it.


◦ true
◦ false




laurencescou

  • Hero Member
  • *****
  • Posts: 593

Computer scientists break the movement of information from raw electrical voltage changes to humanly readable information as a series of 
 abstraction layers. Which of the following is one of these abstraction layers?


◦ Voltage fluctuations
◦ Changes in magnetic energy on the surface of a hard disk
◦ Character sets
◦ Binary streams
◦ All of these




 

Did you know?

Though Candida and Aspergillus species are the most common fungal pathogens causing invasive fungal disease in the immunocompromised, infections due to previously uncommon hyaline and dematiaceous filamentous fungi are occurring more often today. Rare fungal infections, once accurately diagnosed, may require surgical debridement, immunotherapy, and newer antifungals used singly or in combination with older antifungals, on a case-by-case basis.

Did you know?

Though methadone is often used to treat dependency on other opioids, the drug itself can be abused. Crushing or snorting methadone can achieve the opiate "rush" desired by addicts. Improper use such as these can lead to a dangerous dependency on methadone. This drug now accounts for nearly one-third of opioid-related deaths.

Did you know?

Children with strabismus (crossed eyes) can be treated. They are not able to outgrow this condition on their own, but with help, it can be more easily corrected at a younger age. It is important for infants to have eye examinations as early as possible in their development and then another at age 2 years.

Did you know?

Cocaine was isolated in 1860 and first used as a local anesthetic in 1884. Its first clinical use was by Sigmund Freud to wean a patient from morphine addiction. The fictional character Sherlock Holmes was supposed to be addicted to cocaine by injection.

Did you know?

Asthma attacks and symptoms usually get started by specific triggers (such as viruses, allergies, gases, and air particles). You should talk to your doctor about these triggers and find ways to avoid or get rid of them.

For a complete list of videos, visit our video library