When a suspect in a computer crime investigation has deleted computer riles, valuable evidence may still exist in the form of erased files. The data associated with these files can be preserved only through a:
Answer : D
What is the purpose of link analysis?
Answer : B
Examples of res gestae evidence are statements:
Answer : D
What term is given to testimonial evidence presented in court?
Answer : C
The most important reason to conduct investigations as soon as an incident is reported or discovered is:
Answer : D
Which of the fallowing is NOT considered to be necessary administrative information in an investigative report?
Answer : A
Altering a stock certificate to inaccurately list the owner of the certificate with intent to defraud is best described as
Answer : C