Exam 23: Digital Evidence on the Internet

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following tools can reconstruct TCP streams?

(Multiple Choice)
4.8/5
(30)

Freenet is not being widely used by criminals to exchange illegal materials because it is too difficult to use.

(True/False)
4.8/5
(26)

Synchronous chat networks are particularly conducive to criminal activity because of their

(Multiple Choice)
4.8/5
(33)

E-mail Received headers can be relied on for tracking purposes because they cannot be forged.

(True/False)
4.9/5
(36)

Pseudonymous e-mail enables the sender to receive responses to messages whereas anonymous e- mail does not.

(True/False)
4.8/5
(34)

What characteristics of IRC make it attractive to criminals?

(Multiple Choice)
4.9/5
(33)

When it is not possible to determine the identity of the author of a Usenet message using IP addresses in the header, what else can you do to learn more about the author?

(Multiple Choice)
4.8/5
(33)

Who is authorized to conduct online undercover investigations when child pornography is involved?

(Multiple Choice)
5.0/5
(34)

KaZaa has one feature that can be beneficial from an investigative standpoint - whenever possible, it obtains files from peers in the same geographical region.

(True/False)
4.9/5
(30)

All web search engines use the same search syntax.

(True/False)
4.8/5
(37)
Showing 21 - 30 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)