Multiple Choice
Due to caseload and budget constraints, often computer security professionals attempt to limit the damage and close each investigation as quickly as possible. Which of the following is NOT a significant drawback to this approach?
A) Each unreported incident robs attorneys and law enforcement personnel of an opportunity to learn about the basics of computer-related crime.
B) Responsibility for incident resolution frequently does not reside with the security professional, but with management.
C) This approach results in under-reporting of criminal activity, deflating statistics that are used to allocate corporate and government spending on
Combating computer-related crime.
D) Computer security professionals develop loose evidence processing habits that can make it more difficult for law enforcement personnel and attorneys to
Prosecute an offender.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: In terms of digital evidence, the Internet
Q2: The aim of a forensic examination is
Q3: Forensic science is the application of science
Q4: Automobiles have computers that record data such
Q5: Video surveillance can be a form of
Q7: Digital evidence alone can be used to
Q8: What are the main challenges of investigating
Q9: What are the three general categories of
Q10: When a file is deleted from a
Q11: Computers can be used by terrorists to