A and C
The first step in seizing evidence during the bag-and-tag process is to plug the network cable back into the computer. Next, all cables near there terminal end should be labeled and an identical label should be placed next to its corresponding port. Once all the cables and ports have been properly labeled, the forensic examiner should again photograph the back of the computer at several different angels. Taking these photographs will serve as proof for how the computer was configured at the scene. This documentation will be useful if the forensic examiner must later reconstruct the system. Once documented, all the cables connected to the computer should be removed.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Elb
5 months, 1 week ago