Put these forensic acquisition steps in the order in which you would carry them out based on the principles we learned in class:
Determine whether disk encryption is present