Exam 1: Foundations of Digital Forensics
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
In terms of digital evidence, the Internet is an example of:
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
The aim of a forensic examination is to prove with certainty what occurred.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Forensic science is the application of science to investigation and prosecution of crime or to the just resolution of conflict.
Free
(True/False)
4.7/5
(39)
Correct Answer:
True
Automobiles have computers that record data such as vehicle speed, brake status, and throttle position when an accident occurs.
(True/False)
4.9/5
(42)
Due to caseload and budget constraints, often computer security professionals attempt to limit the damage and close each investigation as quickly as possible. Which of the following is NOT a significant drawback to this approach?
(Multiple Choice)
4.9/5
(38)
What are the three general categories of computer systems that can contain digital evidence?
(Multiple Choice)
4.8/5
(42)
When a file is deleted from a hard drive, it can often be recovered.
(True/False)
4.8/5
(42)
Computer professionals who take inappropriate actions when they encounter child pornography on their employer's systems can lose their jobs or break the law.
(True/False)
4.9/5
(46)
The author of a series of threatening e-mails consistently uses "im" instead of "I'm." This is an example of:
(Multiple Choice)
4.8/5
(29)
Personal computers and networks are often a valuable source of evidence. Those involved with _______ should be comfortable with this technology.
(Multiple Choice)
4.8/5
(31)
Why is it important for computer security professionals to become familiar with digital evidence?
(Essay)
4.9/5
(35)
Digital evidence can be duplicated exactly without any changes to the original data.
(True/False)
5.0/5
(34)
All forensic examinations should be performed on the original digital evidence.
(True/False)
4.9/5
(37)
Attorneys and police are encountering progressively more digital evidence in their work.
(True/False)
4.8/5
(39)
In terms of digital evidence, a Smart Card is an example of:
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 36
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)