ISC Exam Questions

Why is the investigation of computer crime involving malicious damage especially challenging?

Why is the investigation of computer crime involving malicious damage especially challenging?

A.
Information stored in a computer is intangible evidence.

B.
Evidence may be destroyed in an attempt to restore the system.

C.
Isolating criminal activity in a detailed audit log is difficult.

D.
Reports resulting from common user error often obscure the actual violation.

Explanation:
The gathering, control, storage, and preservation of evidence are extremely critical
in any legal investigation. Because evidence involved in a computer crime might be intangible and
subject to easy modification without a trace, evidence must be carefully handled and controlled
throughout its entire life cycle. -Ronald Krutz The CISSP PREP Guide (gold edition) pg 432