Exam 11: Searching and Seizing Computer-Related Evidence
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
Innocuous material such as Post-it notes, discarded media, or packaging material will not help in proving intent in a criminal court.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
At a physically and electronically secured site, investigators should gather trace evidence after seizure of electronic evidence.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
Faraday bags can shield wireless devices from remote corruption or deletion of data from cellular, WiFi, or radio signals.
Free
(True/False)
4.9/5
(32)
Correct Answer:
True
Hacker computers should be approached with great caution as hackers take pains to protect their own systems from ________.
(Short Answer)
4.8/5
(37)
The ________ team creates a visible barrier against scene contamination, evidence destruction, and media impropriety.
(Short Answer)
4.8/5
(49)
Which of the following characterizes viewer forensic software?
(Multiple Choice)
5.0/5
(41)
Which of the following would be least advisable if an investigator's camera ran out of film during a crime-scene investigation?
(Multiple Choice)
4.7/5
(39)
Assessment of digital evidence is typically done by analyzing small samples that preserve the totality of the evidence.
(True/False)
4.8/5
(34)
Tools such as screwdrivers, hex wrenches, and plyers used to open computer boxes should be ________.
(Multiple Choice)
4.8/5
(31)
The first step in the preparation of any warrant application for a computer investigation is the operationalization of the crime and, more specifically, defining the role of the ________ in it.
(Multiple Choice)
4.7/5
(31)
An investigation plan that details the background of the suspects relates to which aspect of SMEAC?
(Multiple Choice)
4.9/5
(38)
Investigators wear latex gloves to avoid contamination of fingerprints or other potential trace evidence.
(True/False)
4.8/5
(36)
What steps must be taken to protect computer evidence from getting destroyed, contaminated, or corrupted?
(Essay)
4.8/5
(35)
Which of the following does NOT constitute an on-scene activity in any investigation?
(Multiple Choice)
4.8/5
(37)
________, conductive, and Faraday bags are especially important in the storage, analysis, and transportation of digital evidence.
(Short Answer)
4.9/5
(41)
Computer manuals and packaging materials might be useful for investigators for all of the following reasons EXCEPT which?
(Multiple Choice)
4.9/5
(42)
Computer components and media are more fragile than some ________ forms of evidence.
(Short Answer)
4.9/5
(35)
Match the following computer-specific equipment/software with their uses:
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(32)
Magnetic pulses emitted from car radios and transmitters may ________ computer-related evidence.
(Multiple Choice)
4.7/5
(42)
Showing 1 - 20 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)