When performing a static acquisition, what should be done after the hardware on a suspect's computer has been inventoried and documented??

A. ?Inventory and documentation information should be stored on a drive and then the drive should be reformatted.
B. ?Start the suspect's computer and begin collecting evidence.
C. The hard drive should be removed, if practical, and the system's date and time values should be recorded from the system's CMOS.?
D. ?Connect the suspect's computer to the local network so that up to date forensics utilities can be utilized.

Answer: C

Computer Science & Information Technology

You might also like to view...

The Administrative Templates subcontainer is found under both the Computer and User Configuration Policies containers and holds most of the settings that control the appearance of the desktop environment

Indicate whether the statement is true or false

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. If we want to find the median of 100 scores, we need 100 separate variables to hold the data.. 2. An array behaves like a list of variables each of which is of the same type and for which there is a uniform, convenient naming convention that can be declared in a single line of code. In the explanation, give an example of declaration and access. 3. With arrays, indices start at any number the programmer chooses to indicate in the definition. 4. The programmer should always use a defined constant in an array declaration. 5. When using an array, it is perfectly legal to access indexed variables with index values less than 0 or greater than or equal to the declared size of the array.

Computer Science & Information Technology