Exam 7: Handling a Digital Crime Scene
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
The decision to seize an entire computer versus create a forensic duplicate of the internal hard drive will be influenced by the role of the computer.
(True/False)
4.8/5
(41)
The contents of volatile memory are becoming more and more important.
(True/False)
4.8/5
(40)
Digital investigators like to preserve every potential source of digital evidence; however, they are constrained by:
(Multiple Choice)
4.8/5
(39)
When a piece of evidence has both a biological and a digital component, who should process it first?
(Multiple Choice)
4.8/5
(23)
Which of the following is not a safety consideration for a first responder?
(Multiple Choice)
4.7/5
(40)
In most situations, it is advisable to let the physical crime scene technicians, under the direction of the forensic investigator, process the scene first.
(True/False)
4.9/5
(35)
When seizing a computer, it is advisable to remove the computer's case and to unplug power cables from hard drives.
(True/False)
4.7/5
(42)
On entering a crime scene, an investigator notes that a piece of equipment with antennas attached is connected to one of the target computers. Since this indicates a wireless connection, it is advisable to either disconnect or disable the piece of equipment.
(True/False)
4.7/5
(29)
Computer security professionals should obtain instructions and written authorization from their attorneys before gathering digital evidence relating to an investigation with an organization.
(True/False)
4.9/5
(36)
Why is the first step to secure the physical crime scene by removing everyone from the immediate area?
(Multiple Choice)
4.8/5
(30)
Showing 21 - 32 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)