RAM can be a treasure trove of evidence, including user passwords, Internet activity, running processes, and other important evidence. Therefore, an investigator might want to bring a tool such as Helix for a PC or ________ for a Mac computer to capture the contents of RAM

Fill in the blank(s) with the appropriate word(s).

Answer: MacQuisition. If a computer is still turned on, it is advisable for an investigator to perform triage and image both RAM and potentially the hard drive.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A void function can return results through its reference parameters. 2. The actual argument that is passed to a value parameter can be a constant. 3. The actual argument that is passed to a reference parameter can be a constant. functions. 4. In writing a program with functions, the main function can be written before analyzing the 5. A function should only have one task.

Computer Science & Information Technology

The ____ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.

A. registers B. arithmetic/logic units C. control units D. input/output units

Computer Science & Information Technology