Bob Smith is suspected of using his company’s Internet facilities as a conduit for sending large quantities of SPAM to millions of users. You are called in to examine his computer to see if there is evidence to support this claim. This is initially a form of what type of investigation?
a. Civil
b. Internal
c. Criminal
d. This is not something you would do.
b. Internal
Computer Science & Information Technology
You might also like to view...
[Ctrl][P] in Windows or [command] [P] in Mac prints the HTML code for an open page.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
To make rapid and accurate changes to the appearance of a workbook with very little effort, you can use built-in cell styles
Indicate whether the statement is true or false
Computer Science & Information Technology
Aligning the edges of controls generally makes them easier to read and use.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
________ means responding to risk by not taking a risky action.
A. Risk reduction B. Risk transference C. Risk acceptance D. Risk avoidance
Computer Science & Information Technology