Which option is NOT a goal of computer forensics?

Prepare for the EC-Council Certified Incident Handler Test with an interactive quiz. Study with flashcards, MCQs, hints, and explanations. Ace your test!

The option that is not a goal of computer forensics involves the creation of weak authentication and authorization controls. Computer forensics is primarily concerned with the identification, collection, preservation, and analysis of digital evidence in a manner that maintains the integrity of that evidence for legal proceedings. One of the fundamental objectives is to ensure that all findings are credible and can support investigations into cyber crimes.

The focus of computer forensics is to uncover facts about a digital incident by identifying, gathering, and preserving evidence of cyber crimes, recovering deleted files, and ensuring that all data is handled in a forensically sound manner. These activities are instrumental in understanding the sequence of events that occurred during a security incident and in providing actionable insights to improve security measures.

Creating weak authentication and authorization controls directly opposes the very nature of computer forensics, which aims to establish robust security measures to protect against unauthorized access and data breaches. Therefore, this option clearly does not align with the principles and goals of computer forensics.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy