Exam 23: Digital Evidence on the Internet
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
Web Whacker and Httrack are examples of tools that:
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
Which of the following Internet services can be used to exchange illegal materials?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
D
It is not possible to decrypt and view captured network traffic.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
The cybertrail is only useful for gathering information about an offender, not a victim.
(True/False)
4.7/5
(28)
Whois databases contain contact information relating to IP addresses but not domain names.
(True/False)
4.9/5
(43)
What are two of the most useful headers for determining the origination of Usenet messages?
(Multiple Choice)
4.9/5
(27)
Given the wealth of information that social networks contain, digital investigators will often find useful information at these sites.
(True/False)
4.8/5
(36)
Posting information online takes control of the information away from the person and such information can remain online indefinitely.
(True/False)
4.8/5
(37)
Which of the following applications leave traces of Internet activities on a personal computer?
(Multiple Choice)
5.0/5
(29)
When you access a web page, the content may be located on a server other than the one you accessed.
(True/False)
4.8/5
(34)
What information should you document when searching for evidence on the Web?
(Multiple Choice)
4.8/5
(40)
The "invisible Web" can only be accessed by government employees.
(True/False)
4.9/5
(43)
Criminals let their guard down in chat networks because they feel protected by the perceived anonymity.
(True/False)
4.8/5
(42)
When evidence is located on the Internet, investigators should document and preserve it immediately or it may be gone the next time they look for it.
(True/False)
4.8/5
(26)
The Web archive (web.archive.org) contains a complete and accurate copy of web pages as they existed at a particular time.
(True/False)
4.9/5
(30)
Which of the following enables a user to connect to IRC and run IRC fserves without disclosing their IP address?
(Multiple Choice)
4.9/5
(26)
Why is it important to hide your identity when conducting an online investigation?
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)