Exam 12: Sex Offenders on the Internet
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
Providing information about an offender's method of approach, attack, or control may help investigators interact with an offender or provide potential victims with protective advice.
Free
(True/False)
4.8/5
(43)
Correct Answer:
True
Detailed knowledge of an offender can help investigators:
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
D
Typically, children are not used in undercover investigations because:
Free
(Multiple Choice)
4.9/5
(27)
Correct Answer:
C
"Grooming" refers to the ways that a sexual offender gains control over victims.
(True/False)
4.9/5
(35)
The process of correlating evidence through temporal, relational, and functional analysis is known as:
(Multiple Choice)
4.8/5
(37)
Sex offender peer support groups can give offenders access to child pornography, children, and technical knowledge.
(True/False)
4.8/5
(38)
Failure to interpret evidence, obtain information from an unknown offender, or apprehend an unknown offender can be caused by:
(Multiple Choice)
4.9/5
(37)
When dealing with online sexual offenders, it is critically important to take advantage of the Internet as a source of evidence.
(True/False)
4.9/5
(32)
Generalizations regarding investigations are of particular use, even though cases tend to be unique.
(True/False)
4.8/5
(33)
If an offender's computer reveals a large number of contacts, a good solution is:
(Multiple Choice)
4.9/5
(29)
When the offender is unknown, the reconstruction process becomes a necessary step to:
(Multiple Choice)
4.8/5
(26)
An offender's choice of location, tools, and actions taken are referred to as:
(Multiple Choice)
4.7/5
(35)
The initial stage of any investigation is to determine if a crime has actually occurred.
(True/False)
4.7/5
(41)
Confronting the victim with evidence of their abuse is standard practice in sex offender cases.
(True/False)
4.8/5
(32)
Because sex offenders tend to be nonviolent, investigators do not need to take the same precautions when serving warrants on computer-related offenses as they would with other crimes.
(True/False)
4.8/5
(37)
An accepted method of conducting undercover investigations involves using a minor, especially if the minor is the victim.
(True/False)
4.9/5
(39)
Which of the following is an impact of sex offender peer support groups?
(Multiple Choice)
4.9/5
(30)
Lanning identifies three general categories of sex offenders: situational, preferential, and differential.
(True/False)
4.9/5
(41)
Given the potential for concealment in sex offender cases, it is important to examine all digital evidence carefully rather than simply searching for a obvious items such as images that are not hidden.
(True/False)
4.8/5
(36)
Discuss the responsibility of the digital investigator in bringing charges of sex offense or possession of child pornography against a member of the local community.
(Essay)
4.8/5
(35)
Showing 1 - 20 of 31
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)