Exam 16: Applying Forensic Science to Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The file signature of a Microsoft Word document is an example of what type of characteristic?

Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
Verified

B

List the class and individual characteristics of each of the following: - A JPEG file - A thumb drive - A user manual with handwritten notes

Free
(Essay)
5.0/5
(31)
Correct Answer:
Verified

Class characteristics are generally true for a particular object. Individual characteristics are how that object has been changed by the user.

Regarding the examination of a piece of digital evidence, which of the following is NOT one of the fundamental questions that need to be answered?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

D

Given the risks of collecting a few files only, in most cases it is advisable to preserve the full contents of the disk.

(True/False)
4.8/5
(29)

Preparation planning prior to processing a crime scene should include:

(Multiple Choice)
4.8/5
(30)

When processing the digital crime scene, one aspect of surveying for potential sources of digital evidence is:

(Multiple Choice)
4.8/5
(30)

If it is determined that some hardware should be collected, but there is no compelling need to collect everything, the most sensible approach is to employ:

(Multiple Choice)
4.9/5
(28)

It is not prudent to document the evidence more than one way.

(True/False)
4.8/5
(35)

According to the us Federal guidelines for searching and seizing computers, safe temperature ranges for most magnetic media are:

(Multiple Choice)
4.9/5
(31)

When a computer is to be moved or stored, evidence tape should be put around the main components of the computer in such a way that any attempt to open the casing or use the computer will be evident.

(True/False)
4.9/5
(38)

A forensic crime scene processing kit should contain quantities of those items used to process computer equipment.

(True/False)
4.8/5
(33)

Computers used to store and analyze digital evidence should be connected to the Internet, so that online research can be conducted.

(True/False)
4.8/5
(34)

A crime scene investigator decides to collect the entire computer. In addition, he decides to collect all of the peripheral devices associated with that computer. What reason could he give to justify this?

(Multiple Choice)
4.7/5
(36)

In regard to preservation, in a child pornography investigation, which of the following should be collected?

(Multiple Choice)
4.7/5
(30)

The forensic crime scene processing kit should include all of the following, EXCEPT:

(Multiple Choice)
4.9/5
(25)

Since computer seizures usually happen pretty much the same way, there is no real need to do any pre-planning.

(True/False)
4.9/5
(33)

The reason UNIX "dd" is considered a de facto standard for making bitstream copies is:

(Multiple Choice)
4.8/5
(33)

When documenting a crime scene, the computer and surrounding area should be photographed, detailed sketches should be made, and copious notes should be taken, because:

(Multiple Choice)
4.8/5
(31)

Which of the following is NOT part of the set of forensic methodologies referenced in this book?

(Multiple Choice)
4.7/5
(36)

The severity and the category of cybercrime largely determine how much digital evidence is collected.

(True/False)
4.9/5
(30)
Showing 1 - 20 of 31
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)