Multiple Choice
Common protocol for processing a crime scene involving electronic evidence includes which of the following?
A) photographing and diagramming the placement of all computer terminals
B) holding the IT staff in quarantine until reinforcements arrive
C) obtaining a search warrant
D) unplugging all computers, telephones, and printers
Correct Answer:

Verified
Correct Answer:
Verified
Q39: Computer evidence is:<br>A)next to impossible to destroy.<br>B)destroyed
Q40: The biggest difference between traditional evidence and
Q41: Cyberterrorism is a premeditated, politically motivated attack
Q42: What are some of the essential questions
Q43: What are some of the guidelines investigators
Q45: Data is the residual physical representation of
Q46: Keystroke logging is used in espionage to
Q47: Cybercrime is:<br>A)a local problem.<br>B)a transnational problem.<br>C)strictly a
Q48: A search warrant is needed to search
Q49: The Privacy Protection Act establishes that investigators