Exam 10: Violent Crime and Digital Evidence
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
B
When swift action is needed, law enforcement personnel may be permitted to conduct searches without a warrant. Searches of this kind are permitted under:
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
A
Computers and mobile devices are treated as__________ crime scenes in violent crime investigations.
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
D
A thief who has programmed and released a virus to roam a network looking for victim passwords used for online banking is an example of what offense behavior?
(Multiple Choice)
4.9/5
(38)
The case of a Michigan bank robber requiring tellers to undress so he could photograph them is an example of:
(Multiple Choice)
4.8/5
(29)
The assessment of the victim as they relate to the offender, the crime scene, the incident, and the criminal justice system is known as:
(Multiple Choice)
4.7/5
(39)
When processing the digital crime scene in a violent crime investigation it is important to have_________ to ensure that all digital evidence and findings can hold up under close scrutiny.
(Multiple Choice)
5.0/5
(39)
Computers and mobile devices are treated as primary crime scenes in violent crime investigations.
(True/False)
4.8/5
(32)
When investigating suspects of a violent crime, it is important to look for behaviors that leave digital traces.
(True/False)
4.7/5
(35)
When reconstructing evidence surrounding a violent crime, it is generally helpful to:
(Multiple Choice)
4.7/5
(40)
Victimology is the assessment of the offender as he relates to the crime scene, the incident, and the criminal justice system.
(True/False)
4.7/5
(43)
Privately owned networks are usually a poor source of information when investigating violent crimes.
(True/False)
4.9/5
(37)
What an offender does at a crime scene typically reveals little useful information to digital investigators.
(True/False)
4.9/5
(34)
How the offender approaches and obtains control of a victim or target is significant because it exposes the offender's:
(Multiple Choice)
4.7/5
(31)
One reason not to put too much trust into those who run the company's computers is that:
(Multiple Choice)
4.9/5
(33)
Digital investigators can use information gleaned from many forms of digital evidence to find likely suspects and develop leads.
(True/False)
4.8/5
(44)
Although crime scenes are typically photographed, it is a good idea to create diagrams of the crime scene because:
(Multiple Choice)
4.8/5
(36)
The Federal statute that has a provision allowing Internet service providers to disclose subscriber information to law enforcement in exigent circumstances is:
(Multiple Choice)
5.0/5
(36)
The key to any investigation is luck, which has value only when it is properly acted upon.
(True/False)
4.9/5
(36)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)