Exam 11: Searching and Seizing Computer-Related Evidence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Innocuous material such as Post-it notes, discarded media, or packaging material will not help in proving intent in a criminal court.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

At a physically and electronically secured site, investigators should gather trace evidence after seizure of electronic evidence.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

Faraday bags can shield wireless devices from remote corruption or deletion of data from cellular, WiFi, or radio signals.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

True

Hacker computers should be approached with great caution as hackers take pains to protect their own systems from ________.

(Short Answer)
4.8/5
(37)

The ________ team creates a visible barrier against scene contamination, evidence destruction, and media impropriety.

(Short Answer)
4.8/5
(49)

Which of the following characterizes viewer forensic software?

(Multiple Choice)
5.0/5
(41)

The seizure team is responsible for bagging and tagging.

(True/False)
4.7/5
(41)

Which of the following would be least advisable if an investigator's camera ran out of film during a crime-scene investigation?

(Multiple Choice)
4.7/5
(39)

Assessment of digital evidence is typically done by analyzing small samples that preserve the totality of the evidence.

(True/False)
4.8/5
(34)

Tools such as screwdrivers, hex wrenches, and plyers used to open computer boxes should be ________.

(Multiple Choice)
4.8/5
(31)

The first step in the preparation of any warrant application for a computer investigation is the operationalization of the crime and, more specifically, defining the role of the ________ in it.

(Multiple Choice)
4.7/5
(31)

An investigation plan that details the background of the suspects relates to which aspect of SMEAC?

(Multiple Choice)
4.9/5
(38)

Investigators wear latex gloves to avoid contamination of fingerprints or other potential trace evidence.

(True/False)
4.8/5
(36)

What steps must be taken to protect computer evidence from getting destroyed, contaminated, or corrupted?

(Essay)
4.8/5
(35)

Which of the following does NOT constitute an on-scene activity in any investigation?

(Multiple Choice)
4.8/5
(37)

________, conductive, and Faraday bags are especially important in the storage, analysis, and transportation of digital evidence.

(Short Answer)
4.9/5
(41)

Computer manuals and packaging materials might be useful for investigators for all of the following reasons EXCEPT which?

(Multiple Choice)
4.9/5
(42)

Computer components and media are more fragile than some ________ forms of evidence.

(Short Answer)
4.9/5
(35)
Match the following computer-specific equipment/software with their uses:
Antivirus software
used for the documentation and validation of suspect machines and the prevention of infection of forensic machines
Surge protectors and uninterruptible power supply
used to ensure electrical and telephonic continuity to prevent possible destruction of computer data
Imaging software
used for duplicating original evidence in order to preserve the original evidence and ensure integity of the suspect data
Correct Answer:
Verified
Premises:
Responses:
Antivirus software
used for the documentation and validation of suspect machines and the prevention of infection of forensic machines
Surge protectors and uninterruptible power supply
used to ensure electrical and telephonic continuity to prevent possible destruction of computer data
Imaging software
used for duplicating original evidence in order to preserve the original evidence and ensure integity of the suspect data
Multiple boot disks
used to avoid self-destructive programs employed by the suspect and minimize changes to a suspect drive
Text editors
used to quickly search for keywords applicable to the current investigation; a forensic software typically used for on-site evidence analysis
(Matching)
5.0/5
(32)

Magnetic pulses emitted from car radios and transmitters may ________ computer-related evidence.

(Multiple Choice)
4.7/5
(42)
Showing 1 - 20 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)