After law enforcement is informed of a computer crime, the organization’s investigators constraints
are
A.
removed.
B.
reduced.
C.
increased.
D.
unchanged.
Explanation:
“On the other hand, there are also two major factors that may cause a company to
shy away from calling in the authorities. First, the investigation will more than likely become public
and may embarrass the company. Second, law enforcement authorities are bound to conduct an
investigation that complies with the Fourth Amendment and other legal requirements that may not
apply to a private investigation.” Pg. 529 Tittel: CISSP Study Guide