Exam 1: Computer Forensics and Investigations As a Profession

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below: -the legal process of proving guilt or innocence in court

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

C

What questions should an investigator ask to determine whether a computer crime was committed?

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

In a criminal case, a suspect is tried for a criminal offense, such as burglary, murder, or molestation.To determine whether there was a computer crime, an investigator asks questions such as the following: What was the tool used to commit the crime? Was it a simple trespass? Was it a theft, a burglary, or vandalism? Did the perpetrator infringe on someone else's rights by cyberstalking or e-mail harassment?

What is embezzlement?

Free
(Essay)
4.8/5
(37)
Correct Answer:
Verified

Embezzlement is a common computer crime, particularly in small firms.Typically, the owner is busy and trusts one person, such as the office manager, to handle daily transactions.When the office manager leaves, the owner discovers that some clients were overbilled or others were not billed at all, and money is missing.Rebuilding the paper and electronic trail can be tedious.Collecting enough evidence to press charges might be beyond the owner's capabilities.

Published company policies provide a(n) ____ for a business to conduct internal investigations.

(Multiple Choice)
4.8/5
(37)

Briefly describe the triad that makes up computer security.

(Essay)
4.7/5
(36)

Your ____ as a computer investigation and forensics analyst is critical because it determines your credibility.

(Multiple Choice)
4.8/5
(42)

It's the investigator's responsibility to write the affidavit, which must include ____ (evidence) that support the allegation to justify the warrant.

(Multiple Choice)
4.8/5
(38)

By the early 1990s, the ____ introduced training on software for forensics investigations.

(Multiple Choice)
4.8/5
(29)

In general, a criminal case follows three stages: the complaint, the investigation, and the ____.

(Multiple Choice)
4.9/5
(35)

In a criminal or public case, if you have enough information to support a search warrant, the prosecuting attorney might direct you to submit a(n) ____.

(Multiple Choice)
4.9/5
(33)

Mention examples of groups that should have direct authority to request computer investigations in the corporate environment.

(Essay)
4.8/5
(36)

Match each item with a statement below: -involves selling sensitive or confidential company information to a competitor

(Multiple Choice)
4.8/5
(38)

What are some of the most common types of corporate computer crime?

(Essay)
4.7/5
(39)

What are the three levels of law enforcement expertise established by CTIN?

(Essay)
4.9/5
(39)

Corporations often follow the ____ doctrine, which is what happens when a civilian or corporate investigative agent delivers evidence to a law enforcement officer.

(Multiple Choice)
4.8/5
(44)

To be a successful computer forensics investigator, you must be familiar with more than one computing platform.

(True/False)
4.8/5
(33)

Computer investigations and forensics fall into the same category: public investigations.

(True/False)
4.8/5
(34)

When you work in the ____________________ group, you test and verify the integrity of standalone workstations and network servers.

(Short Answer)
4.8/5
(38)

Match each item with a statement below: -specifies who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence

(Multiple Choice)
4.8/5
(41)

The law of search and seizure protects the rights of all people, excluding people suspected of crimes.

(True/False)
4.9/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)