Exam 1: Foundations of Digital Forensics
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
What is the difference between digital evidence, electronic evidence, and computer evidence?
(Essay)
4.9/5
(29)
In terms of digital evidence, a mobile telephone is an example of:
(Multiple Choice)
5.0/5
(31)
In terms of digital evidence, a hard drive is an example of:
a. Open computer systems
b. Communication systems
c. Embedded computer systems
d. None of the above
(Short Answer)
4.7/5
(31)
Computers can be involved in which of the following types of crime?
(Multiple Choice)
4.7/5
(39)
At what point should computer security professionals stop handling digital evidence and contact law enforcement?
(Essay)
4.8/5
(33)
Even digital investigations that do not result in legal action can benefit from principles of forensic science.
(True/False)
4.8/5
(40)
Computers were involved in the investigations into both World Trade Center attacks.
(True/False)
4.8/5
(43)
What are the three general categories of computer systems that can contain digital evidence? In each category, give a specific source of digital evidence that interests you and describe the type of evidence that you might find.
(Essay)
4.9/5
(26)
An argument for including computer forensic training computer security specialists is:
(Multiple Choice)
4.8/5
(34)
When criminals use computers, what advantages does this have from an investigative standpoint?
(Essay)
4.8/5
(31)
Private networks can be a richer source of evidence than the Internet because:
(Multiple Choice)
4.9/5
(36)
The criminological principle which states that, when anyone, or anything, enters a crime scene he/she takes something of the scene with him/her, and leaves something of himself/herself behind, is:
(Multiple Choice)
4.8/5
(44)
Showing 21 - 36 of 36
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)