Exam 3: Digital Evidence in the Courtroom
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
There is no need for any specialized training in the collection of digital evidence.
Free
(True/False)
4.7/5
(39)
Correct Answer:
False
Evidence contained in a document provided to prove that statements made in court are true is referred to as:
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
C
The process of documenting the seizure of digital evidence and, in particular, when that evidence changes hands, is known as:
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
A
Having a member of the search team trained to handle digital evidence:
(Multiple Choice)
4.9/5
(30)
Chain of custody is the process of documenting who has handled evidence, where and when, as it travels from the crime scene to the courts.
(True/False)
4.7/5
(29)
During testimony, when a lawyer appears not to be tech savvy, it is a good practice to guess what the attorney is trying to ask.
(True/False)
4.8/5
(42)
The fact that with modern technology, a photocopy of a document has become acceptable in place of the original is known as:
(Multiple Choice)
4.8/5
(32)
Typically, a photocopy of a document is considered hearsay evidence and is not admissible in court.
(True/False)
4.9/5
(33)
The application of preconceived theories to a particular case is a good method of reducing caseload.
(True/False)
4.8/5
(32)
Determining whether digital evidence has been tampered with is a major concern of the digital examiner.
(True/False)
4.8/5
(35)
Regarding the admissibility of evidence, which of the following is not a consideration:
(Multiple Choice)
4.8/5
(32)
According to the text, the most common mistake that prevents evidence seized from being admitted is:
(Multiple Choice)
4.7/5
(36)
A digital investigator pursuing a line of investigation in a case because that line of investigation proved successful in two previous cases is an example of:
(Multiple Choice)
4.8/5
(32)
Voir dire is the process of becoming accepted as an expert by the court.
(True/False)
4.8/5
(29)
It is the duty of a digital investigator to ignore influences from any source.
(True/False)
4.9/5
(43)
When assessing the reliability of digital evidence, the investigator is concerned with whether the computer that generated the evidence was functioning normally, and:
(Multiple Choice)
4.9/5
(37)
Digital evidence cannot be direct evidence because of its separation from the events it represents.
(True/False)
4.8/5
(34)
Showing 1 - 20 of 29
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)