Exam 23: Digital Evidence on the Internet
Exam 1: Foundations of Digital Forensics 36 Questions
Exam 2: Language of Computer Crime Investigation33 Questions
Exam 3: Digital Evidence in the Courtroom29 Questions
Exam 4: Cybercrime Law: a United States Perspective30 Questions
Exam 5: Cybercrime Law: a European Perspective30 Questions
Exam 6: Conducting Digital Investigations33 Questions
Exam 7: Handling a Digital Crime Scene32 Questions
Exam 8: Investigative Reconstruction With Digital Evidence32 Questions
Exam 9: Modus Operandi, Motive, and Technology32 Questions
Exam 10: Violent Crime and Digital Evidence30 Questions
Exam 11: Digital Evidence As Alibi18 Questions
Exam 12: Sex Offenders on the Internet31 Questions
Exam 13: Computer Intrusions32 Questions
Exam 14: Cyberstalking31 Questions
Exam 15: Computer Basics for Digital Investigators34 Questions
Exam 16: Applying Forensic Science to Computers31 Questions
Exam 17: Digital Evidence on Windows Systems30 Questions
Exam 18: Digital Evidence on Unix Systems30 Questions
Exam 19: Digital Evidence on Macintosh Systems29 Questions
Exam 20: Digital Evidence on Mobile Devices32 Questions
Exam 21: Network Basics for Digital Investigators33 Questions
Exam 22: Applying Forensic Science to Networks35 Questions
Exam 23: Digital Evidence on the Internet30 Questions
Exam 24: Digital Evidence at the Physical and Data-Link Layers34 Questions
Exam 25: Digital Evidence at the Network and Transport Layers30 Questions
Select questions type
Freenet is not being widely used by criminals to exchange illegal materials because it is too difficult to use.
(True/False)
4.8/5
(26)
Synchronous chat networks are particularly conducive to criminal activity because of their
(Multiple Choice)
4.8/5
(33)
E-mail Received headers can be relied on for tracking purposes because they cannot be forged.
(True/False)
4.9/5
(36)
Pseudonymous e-mail enables the sender to receive responses to messages whereas anonymous e- mail does not.
(True/False)
4.8/5
(34)
What characteristics of IRC make it attractive to criminals?
(Multiple Choice)
4.9/5
(33)
When it is not possible to determine the identity of the author of a Usenet message using IP addresses in the header, what else can you do to learn more about the author?
(Multiple Choice)
4.8/5
(33)
Who is authorized to conduct online undercover investigations when child pornography is involved?
(Multiple Choice)
5.0/5
(34)
KaZaa has one feature that can be beneficial from an investigative standpoint - whenever possible, it obtains files from peers in the same geographical region.
(True/False)
4.9/5
(30)
Showing 21 - 30 of 30
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)