Exam 11: Searching and Seizing Computer-Related Evidence
Exam 1: Introduction and Overview of Computer Forensics and Cybercrime62 Questions
Exam 2: Computer Terminology and History62 Questions
Exam 3: Traditional Computer Crime: Early Hackers and Theft of Components62 Questions
Exam 4: Contemporary Computer Crime63 Questions
Exam 5: Identity Theft and Identity Fraud62 Questions
Exam 6: Terrorism and Organized Crime62 Questions
Exam 7: Avenues for Prosecution and Government Efforts62 Questions
Exam 8: Applying the First Amendment to Computer-Related Crime62 Questions
Exam 9: The Fourth Amendment and Other Legal Issues62 Questions
Exam 10: Computer Forensics: Terminology and Requirements62 Questions
Exam 11: Searching and Seizing Computer-Related Evidence62 Questions
Exam 12: Processing of Evidence and Report Preparation63 Questions
Exam 13: Conclusions and Future Issues61 Questions
Select questions type
SMEAC includes situation, mission, ________, avenues of approach and escape, and communications.
(Short Answer)
5.0/5
(43)
Which of the following would be in a traditional criminal investigative toolkit?
(Multiple Choice)
4.8/5
(39)
Once evidence has been identified, it is necessary to determine if the evidence is actually ________.
(Short Answer)
4.9/5
(35)
Traditional equipment includes evidence tape, used to mark the ________ of the crime scene.
(Short Answer)
4.9/5
(39)
Responsibilities of on-scene case supervisors include information dissemination, and interaction with media.
(True/False)
4.9/5
(29)
Why is documentation so important for any successful criminal investigation? List the minimum non-computer-specific documentation required for an investigation.
(Essay)
4.9/5
(41)
Password crackers enable investigators to circumvent many ________ measures employed by the suspect.
(Short Answer)
4.8/5
(36)
Extra attention by investigators to the configuration of computer equipment, including connections, and the back of the computer serves the following purposes EXCEPT ________.
(Multiple Choice)
4.7/5
(36)
Compared to photographs, sketches represent a more focused illustration of applicable evidence.
(True/False)
4.8/5
(41)
________ allow(s) interviewing of witnesses based on developing evidence, yet may be impossible if there are multiple computers or large drive computers or excessive media.
(Multiple Choice)
4.9/5
(40)
A detailed chain of custody report forms part of ________ specific documentation.
(Short Answer)
4.8/5
(39)
Which of the following statements applies to all on-scene personnel regardless of their assignment?
(Multiple Choice)
4.8/5
(37)
The physical search team is responsible for collection of all potential computer evidence.
(True/False)
4.9/5
(40)
Discuss why it is considered so important for computer experts to assess digital evidence.What risks do you foresee if noncomputer experts were to handle such evidence?
(Essay)
4.8/5
(43)
Capturing the investigative process on videotape and other such documentation is especially important in cases where violations of ________ are alleged.
(Multiple Choice)
4.9/5
(42)
________ ensure data integrity, preventing intentional or accidental manipulation of data.
(Multiple Choice)
4.9/5
(29)
In the preliminary plan of investigation, the mission paragraph of SMEAC elaborates on how the mission will be accomplished.
(True/False)
5.0/5
(38)
Computer criminals pose the same risks to investigators when compared to traditional suspects.
(True/False)
4.8/5
(33)
Computer crime investigations require assessment of ________, which is volatile and voluminous, susceptible to climatic factors as well as human error.
(Short Answer)
4.9/5
(25)
Showing 21 - 40 of 62
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)