1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dedylja [7]
1 year ago
9

you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv

e plugged in. what should you do first? turn on the computer and take screenshots. unplug the external usb hard drive. place the computer in a faraday bag. thoroughly document the state of the equipment.
Computers and Technology
1 answer:
larisa [96]1 year ago
7 0

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

You might be interested in
I neeeeed a girl that is looking for true love, trust me i will love her
nignag [31]

Answer:

sure!

Explanation:

4 0
3 years ago
Read 2 more answers
What has abstraction enabled users to do?
Sindrei [870]

Answer:

c, understand what a computer does

8 0
2 years ago
Read 2 more answers
There are four ways to create a macro? FALSE OR TRUE
Murljashka [212]

Answer: True

Explanation:

There are actually four ways to create a macro. You would want to use %let.

7 0
2 years ago
Read 2 more answers
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
2 years ago
Building relationships during your career exploration called?
BARSIC [14]
This would be  called Networking
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which can be inserted using the insert panel in dreamweaver cc?
    9·1 answer
  • Electronic files created on a computer using programs such as Word software are considered to be _____.documents icons media sav
    15·1 answer
  • What is Administrator windows 10
    8·1 answer
  • When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
    8·1 answer
  • On a router configured to use RIP, the number of routers a packet must travel between before it reaches its destination is calle
    7·1 answer
  • When a diaphragm contracts, a person is<br>Exhaling<br>Inhaling​
    12·2 answers
  • Write an expression that computes the integer average of the int variables exam1 and exam2 (both declared and assigned values).
    15·1 answer
  • What type of network is the internet
    10·1 answer
  • Question 2
    7·1 answer
  • PLEASE HELP! I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please he
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!