Exam 2: Language of Computer Crime Investigation
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
The main reason for seizing contraband or fruits of crime is to prevent and deter future crimes.
Free
(True/False)
4.9/5
(45)
Correct Answer:
True
Contraband is property that the private citizen is not permitted to possess.
Free
(True/False)
4.7/5
(37)
Correct Answer:
True
The American Society of Crime Laboratory Directors (ASCLD) is the only group to establish guidelines for how digital evidence is handled in crime labs.
Free
(True/False)
4.9/5
(34)
Correct Answer:
False
What roles can computers play in a crime? Give an example of each role.
(Essay)
4.8/5
(26)
Digital photographs or videos of child exploitation is an example of:
(Multiple Choice)
4.9/5
(36)
In the course of conducting forensic analysis, which of the following actions are carried out?
(Multiple Choice)
4.9/5
(31)
Network sniffer software is illegal to possess, and therefore is considered contraband.
(True/False)
4.8/5
(41)
The distinction between a computer as the object and subject of a crime is useful from an investigative standpoint because it relates to the intent of the offender.
(True/False)
4.8/5
(39)
When a computer contains only a few pieces of digital evidence, investigators are authorized to collect the entire computer.
(True/False)
4.9/5
(36)
The following specializations exist in digital investigations:
(Multiple Choice)
4.8/5
(36)
When a computer is used to forge documents or break into other computers, it is the subject of the crime.
(True/False)
4.8/5
(29)
The US Computer Assistance Law Enforcement Act (CALEA) that took effect in 2000 compels telephone companies to keep detailed records of their customers' calls for up to three years.
(True/False)
4.8/5
(31)
A single crime can fall into more than one of the following categories: hardware or information as evidence, instrumentality, and contraband or fruits of crime.
(True/False)
4.8/5
(40)
Showing 1 - 20 of 33
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)