New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 5 Question 39 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 39
Topic #: 5
[All ISSMP Questions]

You work as a Forensic Investigator. Which of the following rules will you follow while working on a case? Each correct answer represents a part of the solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C, D

The rules that should be followed by a good forensic investigator are as follows.

Examine original evidence and never rely on the duplicate evidence.

Follow the rules of evidence and never temper the evidence.

Prepare a chain of custody and handle the evidence carefully.

Never exceed the knowledge base of the forensic investigation.

Ensure about the document changes in the evidence.


Contribute your Thoughts:

0/2000 characters
Lea
4 months ago
I thought sometimes duplicates could be useful...
upvoted 0 times
...
Franchesca
4 months ago
Following the rules of evidence is non-negotiable!
upvoted 0 times
...
Filiberto
4 months ago
Wait, are we really never supposed to use duplicates?
upvoted 0 times
...
Belen
4 months ago
Totally agree, original evidence is a must!
upvoted 0 times
...
Fausto
5 months ago
Gotta prepare that chain of custody!
upvoted 0 times
...
Samira
5 months ago
I think all of these options are relevant, but I’m unsure if we covered the part about exceeding knowledge base in depth.
upvoted 0 times
...
Jeff
5 months ago
I'm not entirely sure, but I think we discussed the risks of relying on duplicate evidence. It feels like a key point.
upvoted 0 times
...
Leota
5 months ago
I remember studying the importance of the chain of custody; it seems crucial for maintaining evidence integrity.
upvoted 0 times
...
Cathern
5 months ago
I feel like option D is definitely right about not tampering with evidence, but I’m a bit hazy on the specifics of the other rules.
upvoted 0 times
...
Alexis
5 months ago
This seems like a straightforward question about information security policies. I'll read through it carefully and think about the key points before selecting an answer.
upvoted 0 times
...
Iraida
5 months ago
Okay, let me see here. I think the key is to identify which batch types contain the Cost of Goods Sold and Inventory entries. I'll need to pay close attention to the details in each answer choice.
upvoted 0 times
...

Save Cancel