Exam 16: Applying Forensic Science to Computers
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
When surveying the crime scene for hardware, the investigator should focus on the computer systems since that is where most of the important evidence will be.
(True/False)
4.8/5
(40)
A sound forensic practice is to make at least two copies of digital evidence and to confirm that at least one of the copies was successful and can be accessed on another computer.
(True/False)
4.8/5
(47)
If possible, prior to entering a crime scene, it is useful to try and determine what kind of computer equipment to expect.
(True/False)
4.9/5
(31)
At a crime scene, digital evidence will be found on the computer, on mobile devices, and on shelves, bookcases, and the area surrounding the computer. Therefore, there is no need to search the garbage for evidence.
(True/False)
4.8/5
(24)
The updated ACPO recommendation for seizing a running computer is to pull the electrical cord from the back of the computer.
(True/False)
4.8/5
(34)
Which of the following is NOT an artifact that will be irrevocably lost if the computer is shut down?
(Multiple Choice)
4.8/5
(36)
Which of the following is NOT one of the recommended approaches to preserving digital evidence?
(Multiple Choice)
4.7/5
(31)
Chain of custody documents record who handled the evidence, when, where, and for what purpose.
(True/False)
4.9/5
(33)
Under independent component doctrine, if a computer system must remain in place but it is necessary to take the original hard drive, a reasonable compromise is to duplicate the
(True/False)
4.9/5
(38)
The _______________documentation specifies who handled the evidence, when, where, and for what purpose.
(Multiple Choice)
4.9/5
(41)
Showing 21 - 31 of 31
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)