Multiple Choice
If no destructive processes are running and no items of evidentiary value on the screen,one step in seizing computer crime evidence is to
A) type c:.
B) boot the computer.
C) unplug the computer.
D) record the serial number of all equipment.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q8: The first personal computer was the<br>A) IBM
Q9: The primary purpose of a virus is
Q10: This type of hacker may work for
Q11: A virus is a small program that
Q12: A specially designed malware package with tools
Q14: The FBI and the United States Attorney
Q15: Discuss the issues relating to cybercrime/computer/high technology/electronic
Q16: The two prerequisites for the emergence of
Q17: Discuss the differences between "black hatters" and
Q18: A _is a network of zombies or