Exam 13: Conclusions and Future Issues

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Member countries have been slow to react to international mandates for digital evidence preservation, citing ________ and American imperialism.

(Short Answer)
4.8/5
(34)

Technology has made information ________, thus exponentially increasing its value.

(Multiple Choice)
4.9/5
(39)

Which of the following is true of establishing accountability for Internet users?

(Multiple Choice)
4.8/5
(38)

Self-proclaimed "experts" of computer forensics ________.

(Multiple Choice)
4.9/5
(30)

Data mining can be employed in analyzing intelligence and identifying terrorists.

(True/False)
4.8/5
(34)

Identifying causal relationships or depth and strength of connections is easy with data mining.

(True/False)
4.8/5
(39)

Inaction by the Supreme Court has led to the investigation and prosecution of computer-related crime being hindered by a lack of ________.

(Short Answer)
4.9/5
(40)

Packet sniffing and ________ have proved to be favorite targets of organizations like EPIC and the ACLU.

(Multiple Choice)
4.9/5
(34)

________ statutes require businesses to assure the identity of their customers.

(Short Answer)
4.9/5
(29)

The development of ________ legislation encourages economic growth consistent with an emerging global market.

(Multiple Choice)
4.8/5
(41)

Assess the benefits obtained by the relationship of the law enforcement community with the private sector in investigating and prosecuting computer-related crime.

(Essay)
4.9/5
(33)

In the absence of Multi-Lingual Assistance Treaties (MLATs), international legal assistance is governed by domestic mutual legal assistance laws and practices.

(True/False)
4.9/5
(47)

FCC regulations instruct cellular providers to have the capability of locating phones within a ________ radius for longitude, latitude, and altitude.

(Short Answer)
4.9/5
(39)

Which of the following is a potential benefit that regional or national central reporting stations could offer in an effort to conserve resources in the investigation of computer-related crime?

(Multiple Choice)
5.0/5
(39)

________ is the analysis of large data sets aimed at discovering patterns and relationships.

(Short Answer)
4.8/5
(40)

Which of the following does NOT hinder the efforts of law enforcement authorities?

(Multiple Choice)
4.8/5
(40)

All of the following about creation of a law enforcement departmental Web page are true EXCEPT ________.

(Multiple Choice)
4.8/5
(34)
Match the term with its use.
E-chip blocking software
provides privacy and security for consumers by protecting data
Data encryption
fragments data and places on various server's
Data stripping
filters information, though unable to distinguish between legitimate and indecent information
Correct Answer:
Verified
Premises:
Responses:
E-chip blocking software
provides privacy and security for consumers by protecting data
Data encryption
fragments data and places on various server's
Data stripping
filters information, though unable to distinguish between legitimate and indecent information
(Matching)
4.9/5
(35)

In the context of developing intradepartmental cooperation for computer-related crime, duplication of effort dramatically ________ the efficacy of dedicated efforts.

(Short Answer)
4.8/5
(38)

Data mining practices have also been criticized for ________, as there appears to be a tendency to use mined data for things other than that which it was intended.

(Short Answer)
4.9/5
(32)
Showing 21 - 40 of 61
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)