1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
13

As a digital investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that

got a bomb threat in an anonymous e-mail. The detective already has information from a subpoena sent to the last known ISP where the anonymous e-mail originated, and the message was sent from a residence in the school’s neighborhood. The detective tells you the school principal also stated that the school’s Web server had been defaced by an unknown attacker. The detective has just obtained a warrant for the search and seizure of a computer at the residence the ISP identified. Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of digital evidence when the warrant is carried out
Computers and Technology
1 answer:
marishachu [46]3 years ago
6 0

Answer:

Laptop,Forensics boot disk,Digital camera, flash,disk drive like IDE.,Dual write protect external drive box,Cables like FireWire and USB cables,Cable tags,Indelible markers,labels etc

Explanation: Preservation of digital or computer evidence is one of the key factors to consider in a criminal investigation. Evidence is a major factor in the criminal justice system in most countries of the world.

Laptops,Camera,Flash, Indelible markers, forensic boot disc,disk drive etc are some of the items required to ensure the preservation of digital evidence.

Laptop will help to view and evaluate the emails received and retrieve data,camera will help to take pictures of the crime scene,flash will help to retrieve data from both the computer and the camera etc

You might be interested in
Use the drop-down menu to correctly identify the numbering system.
jeka94

This numbering system uses 8 symbols: octal number

This numbering system uses 0 and 1: binary number

This numbering system uses 16 symbols: hexadecimal

This numbering system uses 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9: decimal number system

This numbering system uses 2 symbols: binary number system

This numbering system uses 10 symbols:   decimal number system

This numbering system uses numbers and letters:   hexadecimal number system

This numbering system uses 0, 1, 2, 3, 5, 6, and 7:   octal number system

4 0
3 years ago
What cell phone technology is the most popular in the united states?
Alchen [17]
IPhone and Android. ....
3 0
3 years ago
Read 2 more answers
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
Fofino [41]
Most significant digit. That's the same that it's called for any number system.
5 0
3 years ago
Read 2 more answers
A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
Andrej [43]
Malware
Hope this helps
3 0
3 years ago
Other questions:
  • A Windows systems administrator should use the Administrator account ________.a. As little as possible, and only when needed b.
    15·1 answer
  • Windows XPProfessional and Windows Vista Both have same devicedrivers.<br> True<br> False
    5·1 answer
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • IPv6 enables hosts to generate their own IPv6 addresses without the need for a DHCPv6 server. This is referred to as stateless a
    7·1 answer
  • Although you are not a full administrator, you are asked to manage a protected document, allowing customized access to any inter
    7·1 answer
  • Which argument forces a writer to return and change the input berfore resolving unicode erroe
    8·1 answer
  • You want to write a Python program to compute the average of three integer quiz grades for a single student. Decide what variabl
    8·1 answer
  • Tell me the errors please
    14·1 answer
  • Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3,
    10·1 answer
  • The local Driver's License Office has asked you to write
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!