- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q:Which of the following come under the guidelines for use during computer forensic investigation?
Each correct answer represents a complete solution. Choose all that apply.
A: Examining or analyzing evidence, Identifying evidence, Collecting or acquiring evidence
Explanation: A number of organizations establish guidelines for use during computer forensic investigations:Identifying evidence: Responding individuals must begin documenting everything that they find at an incident scene.Collecting or acquiring evidence: Adhering to proper evidence collection and documentation techniques while minimizing incident scene contamination is vitally important.Examining or analyzing evidence: The evidence is investigated and analyzed using sound scientific tests and methods which are acceptable both in the forensic community as well as in the court of law.Presentation of evidence and findings: Forensics examiners must present their evidence, findings, and professional opinions in documentation such as court presentations and legal briefs.Answer B is incorrect. Tampering with evidence can be any action that destroys, alters, conceals, or falsifies any sort of evidence. This is an illegal act and does not come under the guidelines for use during computer forensic investigation.
- Get link
- X
- Other Apps
Comments
Post a Comment