Exam 5: Processing Crime and Incident Scenes
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
Match each item with a statement below:
-a data-collecting tool
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
H
Evidence is commonly lost or corrupted through ____, which involves police officers and other professionals who aren't part of the crime scene processing team.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
D
Generally, computer records are considered admissible if they qualify as a ____ record.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
B
Every business or organization must have a well defined process that describes when an investigation can be initiated. At a minimum, most corporate policies require that employers have a ____ that a law or policy is being violated.
(Multiple Choice)
4.7/5
(37)
Give some guidelines on how to video record a computer incident or crime scene.
(Essay)
4.8/5
(36)
Courts consider evidence data in a computer as ____ evidence.
(Multiple Choice)
4.9/5
(23)
When recovering evidence from a contaminated crime scene, if the temperature in the contaminated room is higher than ____ degrees, you should take measures to prevent a hard disk from overheating to prevent damage.
(Multiple Choice)
4.8/5
(30)
_____________________ can be any information stored or transmitted in digital form.
(Short Answer)
4.8/5
(41)
One technique for extracting evidence from large systems is called ____.
(Multiple Choice)
4.9/5
(44)
When seizing computer evidence in criminal investigations, follow the ____ standards for seizing digital data.
(Multiple Choice)
4.9/5
(35)
Match each item with a statement below:
-fingerprints can be tested with these systems
(Multiple Choice)
4.8/5
(30)
____ is facts or circumstances that would lead a reasonable person to believe a crime has been committed or is about to be committed.
(Multiple Choice)
4.8/5
(36)
A judge can exclude evidence obtained from a poorly worded warrant.
(True/False)
4.9/5
(41)
Match each item with a statement below:
-what most cases in the corporate environment are considered
(Multiple Choice)
4.8/5
(33)
Investigating and controlling computer incident scenes in the corporate environment is ____ in the criminal environment.
(Multiple Choice)
4.8/5
(38)
Match each item with a statement below:
-agencies must comply with these laws and make documents they find and create available as public records
(Multiple Choice)
4.7/5
(42)
During an investigation involving a live computer, do not cut electrical power to the running system unless it's an older ____ or MS-DOS system.
(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)