Exam 13: Conclusions and Future Issues

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Summarize the various types of data hiding practices that present unique challenges to law enforcement agencies.

(Essay)
4.7/5
(32)

A letter rogatory is a request for assistance from one country's judicial authority to that of another country.

(True/False)
4.8/5
(41)

Standardization of accreditation for forensic examiners would increase Daubert/Frye challenges to the recovery of digital evidence.

(True/False)
4.8/5
(37)

________ is a data hiding practice that fragments the data and places it on various servers.

(Short Answer)
4.8/5
(44)

Which of the following is NOT one of the traditional problems that must be overcome for there to be effective international cooperation and fewer jurisdictional disputes relating to digital evidence?

(Multiple Choice)
4.9/5
(42)

Which of the following is true of remote data storage?

(Multiple Choice)
4.8/5
(37)
Match the term with its function.
The Electronic Commerce and Consumer Protection Group
aims at the retention of data to identify online predator's
Letter rogatory
provides mechanism for communication in emergency situations
Departmental Web page
requests judicial assistance from another countivy
Correct Answer:
Verified
Premises:
Responses:
The Electronic Commerce and Consumer Protection Group
aims at the retention of data to identify online predator's
Letter rogatory
provides mechanism for communication in emergency situations
Departmental Web page
requests judicial assistance from another countivy
(Matching)
4.8/5
(28)

Which of the following is considered true about the use of computers in virtual reality?

(Multiple Choice)
4.9/5
(31)

To govern decency on the Web, bills have introduced the proposal of using "E-chip" blocking software as information filters.

(True/False)
4.7/5
(32)

What do existing forfeiture statutes mandate?

(Multiple Choice)
4.8/5
(29)

Predictive data mining is a valuable tool for the identification of crime trends and suspected terrorists.

(True/False)
4.7/5
(44)

The inclusion of true experts in the development of expertise in forensic methodologies and examiners would result in ________.

(Multiple Choice)
4.9/5
(37)

Data mining can readily differentiate between good and bad data sources.

(True/False)
4.9/5
(32)

The effectiveness of data mining will be ________ by cleaning up data that has been compromised.

(Short Answer)
4.8/5
(36)

Teamwork between the law enforcement community and high-tech corporations will result in decreased reporting of criminal victimization among corporate targets.

(True/False)
4.9/5
(31)

Which of the following statements is true of data mining?

(Multiple Choice)
4.9/5
(37)

According to privacy advocates the practice of data mining, due to its limitations, violates ________.

(Short Answer)
4.9/5
(35)

Presence of duplicate records can affect the quality of data in data mining.

(True/False)
4.8/5
(43)

Law enforcement authorities can tap into traditional telephonic exchanges more easily than into wireless communications.

(True/False)
4.7/5
(39)

The proposal of rating systems for sites is considered unworkable, as no agency is available to enforce such ratings.

(True/False)
4.8/5
(45)
Showing 41 - 60 of 61
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)