Exam 8: Digital Evidence, Computer Forensics, and Investigation
Exam 1: Introduction to Forensic Science20 Questions
Exam 2: Crime Scene Investigation20 Questions
Exam 3: Nature of Evidence18 Questions
Exam 4: Separating Complex Mixtures20 Questions
Exam 5: Light and Matter20 Questions
Exam 6: Microscopy20 Questions
Exam 7: Detector Dogs As Forensic Tools30 Questions
Exam 8: Digital Evidence, Computer Forensics, and Investigation20 Questions
Exam 9: Forensic Engineering20 Questions
Exam 10: Fingerprints and Other Impressions22 Questions
Exam 11: Questioned Documents20 Questions
Exam 12: Firearms and Toolmarks25 Questions
Exam 13: Forensic Pathology25 Questions
Exam 14: Anthropology and Odontology26 Questions
Exam 15: Forensic Palynology Entomology20 Questions
Exam 16: Serology29 Questions
Exam 17: Dna Typing26 Questions
Exam 18: Hair19 Questions
Exam 19: Illicit Drugs29 Questions
Exam 20: Forensic Toxicology33 Questions
Exam 21: Fibers, Paints, and Other Polymers27 Questions
Exam 22: Glass and Soil27 Questions
Exam 23: Fires and Explosions27 Questions
Exam 24: Presentation of Forensic Evidence in Court24 Questions
Exam 25: Forensic Psychology19 Questions
Select questions type
Which of the following principles allows computer evidence to be seized without a warrant?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
A
In a preliminary computer crime investigation, it is always assumed that a crime has occurred.
Free
(True/False)
4.8/5
(39)
Correct Answer:
False
Which of the following is not part of a preliminary computer crime investigation?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
Which of the following is least likely to involve computers in commission of a crime?
(Multiple Choice)
4.7/5
(29)
The vast majority of computer-related crimes are prosecuted and most end up as convictions.
(True/False)
4.8/5
(41)
Which of the following is not an important component of a computer crime investigation?
(Multiple Choice)
4.9/5
(41)
If a computer is found to be on at a crime scene, it should be immediately turned off to prevent data wipe.
(True/False)
4.9/5
(35)
Forensic analysis of computers usually involves making one or more copies of the contents of a hard drive.
(True/False)
4.7/5
(36)
Which of the following is not a device that generate digital evidence?
(Multiple Choice)
4.9/5
(32)
"Cyber crime", "computer crime" and "e-crime" all mean the same thing.
(True/False)
4.8/5
(42)
What precaution should be taken to prevent the remote destruction of the data in a mobile device?
(Multiple Choice)
4.8/5
(32)
Which of the following is the least important aspect of investigating a cyber crime scene?
(Multiple Choice)
4.8/5
(45)
Computer crimes are only concerned with laptop or tablet computers.
(True/False)
4.8/5
(44)
Which of the following is not important data that should be gathered about an electronic device prior to seizure?
(Multiple Choice)
4.8/5
(32)
Which of the following is not an important component of recording a computer crime scene?
(Multiple Choice)
4.8/5
(36)
Identity theft crimes have become major computer crimes in recent years.
(True/False)
4.9/5
(33)
Computer forensics is the study of computer technology as it relates to the law.
(True/False)
4.7/5
(39)
The problem of computer viruses has been ignored by federal and state laws.
(True/False)
4.9/5
(43)
Which of the following is not recent federal legislation that affects computer crime?
(Multiple Choice)
4.9/5
(48)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)