Exam 11: Searching and Seizing Computer-Related Evidence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

SMEAC includes situation, mission, ________, avenues of approach and escape, and communications.

(Short Answer)
5.0/5
(43)

Which of the following would be in a traditional criminal investigative toolkit?

(Multiple Choice)
4.8/5
(39)

Once evidence has been identified, it is necessary to determine if the evidence is actually ________.

(Short Answer)
4.9/5
(35)

Traditional equipment includes evidence tape, used to mark the ________ of the crime scene.

(Short Answer)
4.9/5
(39)

Responsibilities of on-scene case supervisors include information dissemination, and interaction with media.

(True/False)
4.9/5
(29)

Why is documentation so important for any successful criminal investigation? List the minimum non-computer-specific documentation required for an investigation.

(Essay)
4.9/5
(41)

Password crackers enable investigators to circumvent many ________ measures employed by the suspect.

(Short Answer)
4.8/5
(36)

Extra attention by investigators to the configuration of computer equipment, including connections, and the back of the computer serves the following purposes EXCEPT ________.

(Multiple Choice)
4.7/5
(36)

Compared to photographs, sketches represent a more focused illustration of applicable evidence.

(True/False)
4.8/5
(41)

________ allow(s) interviewing of witnesses based on developing evidence, yet may be impossible if there are multiple computers or large drive computers or excessive media.

(Multiple Choice)
4.9/5
(40)

A detailed chain of custody report forms part of ________ specific documentation.

(Short Answer)
4.8/5
(39)

Which of the following statements applies to all on-scene personnel regardless of their assignment?

(Multiple Choice)
4.8/5
(37)

The physical search team is responsible for collection of all potential computer evidence.

(True/False)
4.9/5
(40)

Discuss why it is considered so important for computer experts to assess digital evidence.What risks do you foresee if noncomputer experts were to handle such evidence?

(Essay)
4.8/5
(43)

Capturing the investigative process on videotape and other such documentation is especially important in cases where violations of ________ are alleged.

(Multiple Choice)
4.9/5
(42)

________ ensure data integrity, preventing intentional or accidental manipulation of data.

(Multiple Choice)
4.9/5
(29)

In the preliminary plan of investigation, the mission paragraph of SMEAC elaborates on how the mission will be accomplished.

(True/False)
5.0/5
(38)

Computer criminals pose the same risks to investigators when compared to traditional suspects.

(True/False)
4.8/5
(33)

Computer crime investigations require assessment of ________, which is volatile and voluminous, susceptible to climatic factors as well as human error.

(Short Answer)
4.9/5
(25)

Which of the following is true of seizure of equipment?

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)