Exam 13: Conclusions and Future Issues

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following statements about cell phone viruses are true EXCEPT which?

Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
Verified

B

Standardization of accreditation does not require a universal acceptance or rigorous testing of all experts in the field.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

Match the organization with its function.
Department of Defense
compares its databases with those of the FBI to verify identities in Project Strikeback
National Infrastructure Advisory Council
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Security Agency
promotes awareness of best practices of cybersecurity
Correct Answer:
Verified
Premises:
Responses:
Department of Defense
compares its databases with those of the FBI to verify identities in Project Strikeback
National Infrastructure Advisory Council
mines the intelligence community and the Internet to identify terrorists through the Verity K2 Enterprise program
National Security Agency
promotes awareness of best practices of cybersecurity
Department of Education
employs software to analyze phone records and other voluminous data
Free
(Matching)
4.7/5
(49)
Correct Answer:
Verified

Legislatures struggling with issues of state sovereignty must ensure that the federal government takes the role of ________.

(Multiple Choice)
4.8/5
(47)

Which of the following is considered one of the limitations of data mining as a popular analysis tool?

(Multiple Choice)
4.8/5
(39)

Which of the following is true about the standard of accreditation of computer forensics?

(Multiple Choice)
4.8/5
(38)

Federal authorities should develop ________ with enforcement components of other nations in the absence of Multi-Lingual Assistance Treaties.

(Short Answer)
4.9/5
(35)

Analyze the factors that necessitate the establishment of a standard of accreditation or expertise for computer forensics.Also list the issues to be addressed by such standardization.

(Essay)
4.7/5
(42)

What is the primary reason for the lack of nomenclature that has hindered the investigation and prosecution of computer-related crime?

(Multiple Choice)
4.8/5
(34)

Which of the following was the Organization for Economic Cooperation and Development unable to accomplish in its efforts to promote international mandates on computer-related criminal activity?

(Multiple Choice)
4.8/5
(34)

Internet downloads, Bluetooth wireless connection, and ________ are the ways by which cell phone viruses are spread via smart phones with connection and data capabilities.

(Short Answer)
4.9/5
(37)

Which of the following practices can be employed to enhance the effectiveness of data mining?

(Multiple Choice)
4.9/5
(34)

A ________ is software that captures every action undertaken by an individual user of a suspect machine.

(Short Answer)
4.9/5
(42)

The three operational modes of a model law enforcement agency are incident response, ________ management, and prevention.

(Short Answer)
4.8/5
(32)

Legislation that mandates accountability of ________ servers should be developed to reduce the number of DOS attacks.

(Short Answer)
4.8/5
(36)

Which of the following is true regarding the application of wireless communications?

(Multiple Choice)
4.8/5
(36)

Which of the following statements is considered true regarding the development of computer-specific legislation?

(Multiple Choice)
4.8/5
(48)

The increase of remote data storage facilities is conducive to the efforts of law enforcement authorities.

(True/False)
4.7/5
(34)

The establishment of an accreditation of forensic methodologies and examiners is expected to ________.

(Multiple Choice)
4.8/5
(37)

Legitimate revenue that is intermingled with money-laundered funds cannot be seized.

(True/False)
4.8/5
(37)
Showing 1 - 20 of 61
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)