If an investigator needs to communicate with another investigator but does not want the criminal to be able to eavesdrop on this conversation, what type of communication should be used?
Which of the following would be a violation of the (ISC)2 Code of Ethics that could cause the candidate to lose his or her certification?
After a computer forensics investigator seizes a computer during a crime investigation, what is the next step?