Exam 1: Foundations of Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In terms of digital evidence, the Internet is an example of:

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

The aim of a forensic examination is to prove with certainty what occurred.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Forensic science is the application of science to investigation and prosecution of crime or to the just resolution of conflict.

Free
(True/False)
4.7/5
(39)
Correct Answer:
Verified

True

Automobiles have computers that record data such as vehicle speed, brake status, and throttle position when an accident occurs.

(True/False)
4.9/5
(42)

Video surveillance can be a form of digital evidence.

(True/False)
4.8/5
(34)

Due to caseload and budget constraints, often computer security professionals attempt to limit the damage and close each investigation as quickly as possible. Which of the following is NOT a significant drawback to this approach?

(Multiple Choice)
4.9/5
(38)

Digital evidence alone can be used to build a solid case.

(True/False)
4.9/5
(38)

What are the main challenges of investigating computer-related crime?

(Essay)
4.8/5
(38)

What are the three general categories of computer systems that can contain digital evidence?

(Multiple Choice)
4.8/5
(42)

When a file is deleted from a hard drive, it can often be recovered.

(True/False)
4.8/5
(42)

Computers can be used by terrorists to detonate bombs.

(True/False)
4.9/5
(35)

Computer professionals who take inappropriate actions when they encounter child pornography on their employer's systems can lose their jobs or break the law.

(True/False)
4.9/5
(46)

The author of a series of threatening e-mails consistently uses "im" instead of "I'm." This is an example of:

(Multiple Choice)
4.8/5
(29)

Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.

(Multiple Choice)
4.8/5
(31)

A logon record tells us that, at a specific time:

(Multiple Choice)
4.8/5
(41)

Why is it important for computer security professionals to become familiar with digital evidence?

(Essay)
4.9/5
(35)

Digital evidence can be duplicated exactly without any changes to the original data.

(True/False)
5.0/5
(34)

All forensic examinations should be performed on the original digital evidence.

(True/False)
4.9/5
(37)

Attorneys and police are encountering progressively more digital evidence in their work.

(True/False)
4.8/5
(39)

In terms of digital evidence, a Smart Card is an example of:

(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 36
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)