Exam 5: Processing Crime and Incident Scenes
Exam 1: Computer Forensics and Investigations As a Profession50 Questions
Exam 2: Understanding Computer Investigations50 Questions
Exam 3: The Investigators Office and Laboratory50 Questions
Exam 4: Data Acquisition50 Questions
Exam 5: Processing Crime and Incident Scenes50 Questions
Exam 6: Working With Windows and Dos Systems50 Questions
Exam 7: Current Computer Forensics Tools50 Questions
Exam 8: Macintosh and Linux Boot Processes and File Systems50 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Recovering Graphics Files50 Questions
Exam 11: Virtual Machines, Network Forensics, and Live Acquisitions50 Questions
Exam 12: E-Mail Investigations48 Questions
Exam 13: Cell Phone and Mobile Device Forensics37 Questions
Exam 14: Report Writing for High-Tech Investigations48 Questions
Exam 15: Expert Testimony in High-Tech Investigations50 Questions
Exam 16: Ethics for the Expert Witness35 Questions
Select questions type
ISPs can investigate computer abuse committed by their customers.
(True/False)
4.8/5
(28)
Match each item with a statement below:
-you should rely on this when dealing with a terrorist attack
(Multiple Choice)
4.9/5
(38)
Match each item with a statement below:
-information unrelated to a computing investigation case
(Multiple Choice)
4.8/5
(32)
Match each item with a statement below:
-sets standards for recovering, preserving, and examining digital evidence
(Multiple Choice)
5.0/5
(38)
Private-sector organizations include businesses and _________________________ that aren't involved in law enforcement.
(Short Answer)
4.8/5
(37)
Why should companies publish a policy stating their right to inspect computing assets at will?
(Essay)
4.9/5
(36)
Environmental and ____ issues are your primary concerns when you're working at the scene to gather information about an incident or a crime.
(Multiple Choice)
4.8/5
(36)
Some computer cases involve dangerous settings. For these types of investigations, you must rely on the skills of _________________________ teams to recover evidence from the scene.
(Short Answer)
4.9/5
(33)
The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene's immediate location.
(True/False)
4.7/5
(39)
Real-time surveillance requires ____ data transmissions between a suspect's computer and a network server.
(Multiple Choice)
4.9/5
(33)
If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have a(n) _________________________.
(Short Answer)
4.8/5
(32)
A(n) ____ should include all the tools you can afford to take to the field.
(Multiple Choice)
4.7/5
(43)
Law enforcement investigators need a(n) ____ to remove computers from a crime scene and transport them to a lab.
(Multiple Choice)
4.8/5
(32)
Confidential business data included with the criminal evidence are referred to as ____ data.
(Multiple Choice)
4.9/5
(40)
Most federal courts have interpreted computer records as ____ evidence.
(Multiple Choice)
4.9/5
(40)
Certain files, such as the ____ and Security log in Windows XP, might lose essential network activity records if the power is terminated without a proper shutdown.
(Multiple Choice)
4.8/5
(46)
Match each item with a statement below:
-secondhand or indirect evidence, such as an overheard conversation
(Multiple Choice)
4.9/5
(27)
With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)