Exam 8: Investigative Reconstruction With Digital Evidence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One of the most important things to establish when a computer is directly involved in the commission of a crime is:

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

When assessing the risk of a target computer, investigators should determine if the offender needed a high level of skill.

Free
(True/False)
4.8/5
(28)
Correct Answer:
Verified

True

An example of online behavior that puts an individual at higher risk for cyberstalking is:

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

D

Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction?

(Multiple Choice)
4.7/5
(34)

The machine with an old operating system, no patches, and many services running, located on an unprotected network, containing valuable information, and with a history of intrusions or intrusion attempts, is at low risk of being broken into.

(True/False)
4.9/5
(31)

The investigation and study of victim characteristics is known as:

(Multiple Choice)
4.9/5
(30)

When a computer is the target of an attack, it is also useful to determine if the system was at high or low risk of being targeted.

(True/False)
4.8/5
(33)

Victimology is the investigation and study of victim characteristics.

(True/False)
4.7/5
(38)

The temporal form of investigative reconstruction helps identify event sequences and patterns.

(True/False)
4.7/5
(36)

A threshold assessment report may have a similar structure to a full investigative report but includes more details and has firmer conclusions based on all the evidence available.

(True/False)
4.7/5
(32)

Threshold assessments have eliminated the need for digital investigators to write full reports.

(True/False)
4.7/5
(37)

Although it is possible that the Internet can significantly increase the victim's risk, it is not necessary for victimology to include a thorough search for cybertrails.

(True/False)
4.9/5
(39)

The process of evaluating available evidence objectively, independent of the interpretations of others, to determine its true meaning is referred to as:

(Multiple Choice)
4.9/5
(32)

Forensic analysis and reconstruction only include evidence that was left at a crime scene and are intrinsically limited.

(True/False)
4.8/5
(39)

Because seemingly minor details regarding the offender can be important, investigators should get into the habit of contemplating which of the following:

(Multiple Choice)
4.9/5
(34)

In the movie Home Alone one of the burglars would always turn the water on in the sinks so that the house would be flooded when the owners returned. In terms of crime scene characteristics, this is an example of:

(Multiple Choice)
5.0/5
(41)

The functional form of investigative reconstruction answers the questions "Who?" "What?" and "Where?"

(True/False)
4.8/5
(35)

Different offenders can use the same method of approach for control for very different reasons; however, it is possible to make reliable generations on the basis of individual crime scene characteristics.

(True/False)
4.8/5
(35)

Investigative reconstruction is composed of three different forms. Which of the following is NOT one of those three forms?

(Multiple Choice)
4.9/5
(41)

Among the more informative aspects of the offender-victim relationships are victim risk and the effort than an offender was willing to make to access a specific victim.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)