Exam 8: Investigative Reconstruction With Digital Evidence
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
One of the most important things to establish when a computer is directly involved in the commission of a crime is:
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
When assessing the risk of a target computer, investigators should determine if the offender needed a high level of skill.
Free
(True/False)
4.8/5
(28)
Correct Answer:
True
An example of online behavior that puts an individual at higher risk for cyberstalking is:
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
D
Creating a histogram of times to reveal periods of high activity is an example of which form of investigative reconstruction?
(Multiple Choice)
4.7/5
(34)
The machine with an old operating system, no patches, and many services running, located on an unprotected network, containing valuable information, and with a history of intrusions or intrusion attempts, is at low risk of being broken into.
(True/False)
4.9/5
(31)
The investigation and study of victim characteristics is known as:
(Multiple Choice)
4.9/5
(30)
When a computer is the target of an attack, it is also useful to determine if the system was at high or low risk of being targeted.
(True/False)
4.8/5
(33)
Victimology is the investigation and study of victim characteristics.
(True/False)
4.7/5
(38)
The temporal form of investigative reconstruction helps identify event sequences and patterns.
(True/False)
4.7/5
(36)
A threshold assessment report may have a similar structure to a full investigative report but includes more details and has firmer conclusions based on all the evidence available.
(True/False)
4.7/5
(32)
Threshold assessments have eliminated the need for digital investigators to write full reports.
(True/False)
4.7/5
(37)
Although it is possible that the Internet can significantly increase the victim's risk, it is not necessary for victimology to include a thorough search for cybertrails.
(True/False)
4.9/5
(39)
The process of evaluating available evidence objectively, independent of the interpretations of others, to determine its true meaning is referred to as:
(Multiple Choice)
4.9/5
(32)
Forensic analysis and reconstruction only include evidence that was left at a crime scene and are intrinsically limited.
(True/False)
4.8/5
(39)
Because seemingly minor details regarding the offender can be important, investigators should get into the habit of contemplating which of the following:
(Multiple Choice)
4.9/5
(34)
In the movie Home Alone one of the burglars would always turn the water on in the sinks so that the house would be flooded when the owners returned. In terms of crime scene characteristics, this is an example of:
(Multiple Choice)
5.0/5
(41)
The functional form of investigative reconstruction answers the questions "Who?" "What?" and "Where?"
(True/False)
4.8/5
(35)
Different offenders can use the same method of approach for control for very different reasons; however, it is possible to make reliable generations on the basis of individual crime scene characteristics.
(True/False)
4.8/5
(35)
Investigative reconstruction is composed of three different forms. Which of the following is NOT one of those three forms?
(Multiple Choice)
4.9/5
(41)
Among the more informative aspects of the offender-victim relationships are victim risk and the effort than an offender was willing to make to access a specific victim.
(True/False)
4.9/5
(39)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)