Exam 2: Language of Computer Crime Investigation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The main reason for seizing contraband or fruits of crime is to prevent and deter future crimes.

Free
(True/False)
4.9/5
(45)
Correct Answer:
Verified

True

Contraband is property that the private citizen is not permitted to possess.

Free
(True/False)
4.7/5
(37)
Correct Answer:
Verified

True

The American Society of Crime Laboratory Directors (ASCLD) is the only group to establish guidelines for how digital evidence is handled in crime labs.

Free
(True/False)
4.9/5
(34)
Correct Answer:
Verified

False

What roles can computers play in a crime? Give an example of each role.

(Essay)
4.8/5
(26)

An instrumentality of a crime is:

(Multiple Choice)
4.8/5
(36)

Digital photographs or videos of child exploitation is an example of:

(Multiple Choice)
4.9/5
(36)

Stolen bank account information is an example of:

(Multiple Choice)
4.9/5
(34)

In the course of conducting forensic analysis, which of the following actions are carried out?

(Multiple Choice)
4.9/5
(31)

Network sniffer software is illegal to possess, and therefore is considered contraband.

(True/False)
4.8/5
(41)

A cloned mobile telephone is an example of:

(Multiple Choice)
4.7/5
(26)

The distinction between a computer as the object and subject of a crime is useful from an investigative standpoint because it relates to the intent of the offender.

(True/False)
4.8/5
(39)

A network can be an instrumentality of a crime.

(True/False)
4.8/5
(28)

A printer used for counterfeiting is an example of:

(Multiple Choice)
4.9/5
(39)

The first US law to address computer crime was:

(Multiple Choice)
4.8/5
(28)

When a computer contains only a few pieces of digital evidence, investigators are authorized to collect the entire computer.

(True/False)
4.9/5
(36)

The following specializations exist in digital investigations:

(Multiple Choice)
4.8/5
(36)

A network sniffer program is an example of:

(Multiple Choice)
4.9/5
(31)

When a computer is used to forge documents or break into other computers, it is the subject of the crime.

(True/False)
4.8/5
(29)

The US Computer Assistance Law Enforcement Act (CALEA) that took effect in 2000 compels telephone companies to keep detailed records of their customers' calls for up to three years.

(True/False)
4.8/5
(31)

A single crime can fall into more than one of the following categories: hardware or information as evidence, instrumentality, and contraband or fruits of crime.

(True/False)
4.8/5
(40)
Showing 1 - 20 of 33
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)