Exam 16: Applying Forensic Science to Computers
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
The file signature of a Microsoft Word document is an example of what type of characteristic?
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
B
List the class and individual characteristics of each of the following:
- A JPEG file
- A thumb drive
- A user manual with handwritten notes
Free
(Essay)
5.0/5
(31)
Correct Answer:
Class characteristics are generally true for a particular object. Individual characteristics are how that object has been changed by the user.
Regarding the examination of a piece of digital evidence, which of the following is NOT one of the fundamental questions that need to be answered?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
Given the risks of collecting a few files only, in most cases it is advisable to preserve the full contents of the disk.
(True/False)
4.8/5
(29)
Preparation planning prior to processing a crime scene should include:
(Multiple Choice)
4.8/5
(30)
When processing the digital crime scene, one aspect of surveying for potential sources of digital evidence is:
(Multiple Choice)
4.8/5
(30)
If it is determined that some hardware should be collected, but there is no compelling need to collect everything, the most sensible approach is to employ:
(Multiple Choice)
4.9/5
(28)
According to the us Federal guidelines for searching and seizing computers, safe temperature ranges for most magnetic media are:
(Multiple Choice)
4.9/5
(31)
When a computer is to be moved or stored, evidence tape should be put around the main components of the computer in such a way that any attempt to open the casing or use the computer will be evident.
(True/False)
4.9/5
(38)
A forensic crime scene processing kit should contain quantities of those items used to process computer equipment.
(True/False)
4.8/5
(33)
Computers used to store and analyze digital evidence should be connected to the Internet, so that online research can be conducted.
(True/False)
4.8/5
(34)
A crime scene investigator decides to collect the entire computer. In addition, he decides to collect all of the peripheral devices associated with that computer. What reason could he give to justify this?
(Multiple Choice)
4.7/5
(36)
In regard to preservation, in a child pornography investigation, which of the following should be collected?
(Multiple Choice)
4.7/5
(30)
The forensic crime scene processing kit should include all of the following, EXCEPT:
(Multiple Choice)
4.9/5
(25)
Since computer seizures usually happen pretty much the same way, there is no real need to do any pre-planning.
(True/False)
4.9/5
(33)
The reason UNIX "dd" is considered a de facto standard for making bitstream copies is:
(Multiple Choice)
4.8/5
(33)
When documenting a crime scene, the computer and surrounding area should be photographed, detailed sketches should be made, and copious notes should be taken, because:
(Multiple Choice)
4.8/5
(31)
Which of the following is NOT part of the set of forensic methodologies referenced in this book?
(Multiple Choice)
4.7/5
(36)
The severity and the category of cybercrime largely determine how much digital evidence is collected.
(True/False)
4.9/5
(30)
Showing 1 - 20 of 31
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)