Bob Smith is suspected of using his company’s Internet facilities as a conduit for sending large quantities of SPAM to millions of users. You are called in to examine his computer to see if there is evidence to support this claim. This is initially a form of what type of investigation?

a. Civil
b. Internal
c. Criminal
d. This is not something you would do.


b. Internal

Computer Science & Information Technology

You might also like to view...

[Ctrl][P] in Windows or [command] [P] in Mac prints the HTML code for an open page. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To make rapid and accurate changes to the appearance of a workbook with very little effort, you can use built-in cell styles

Indicate whether the statement is true or false

Computer Science & Information Technology

Aligning the edges of controls generally makes them easier to read and use.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

________ means responding to risk by not taking a risky action.

A. Risk reduction B. Risk transference C. Risk acceptance D. Risk avoidance

Computer Science & Information Technology