Exam 5: Processing Crime and Incident Scenes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

ISPs can investigate computer abuse committed by their customers.

(True/False)
4.8/5
(28)

Match each item with a statement below: -you should rely on this when dealing with a terrorist attack

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below: -information unrelated to a computing investigation case

(Multiple Choice)
4.8/5
(32)

Match each item with a statement below: -sets standards for recovering, preserving, and examining digital evidence

(Multiple Choice)
5.0/5
(38)

The FOIA was originally enacted in the ____.

(Multiple Choice)
4.8/5
(43)

The most common computer-related crime is ____.

(Multiple Choice)
4.7/5
(36)

Private-sector organizations include businesses and _________________________ that aren't involved in law enforcement.

(Short Answer)
4.8/5
(37)

Why should companies publish a policy stating their right to inspect computing assets at will?

(Essay)
4.9/5
(36)

Environmental and ____ issues are your primary concerns when you're working at the scene to gather information about an incident or a crime.

(Multiple Choice)
4.8/5
(36)

Some computer cases involve dangerous settings. For these types of investigations, you must rely on the skills of _________________________ teams to recover evidence from the scene.

(Short Answer)
4.9/5
(33)

The reason for the standard practice of securing an incident or crime scene is to expand the area of control beyond the scene's immediate location.

(True/False)
4.7/5
(39)

Real-time surveillance requires ____ data transmissions between a suspect's computer and a network server.

(Multiple Choice)
4.9/5
(33)

If a company does not publish a policy stating that it reserves the right to inspect computing assets at will or display a warning banner, employees have a(n) _________________________.

(Short Answer)
4.8/5
(32)

A(n) ____ should include all the tools you can afford to take to the field.

(Multiple Choice)
4.7/5
(43)

Law enforcement investigators need a(n) ____ to remove computers from a crime scene and transport them to a lab.

(Multiple Choice)
4.8/5
(32)

Confidential business data included with the criminal evidence are referred to as ____ data.

(Multiple Choice)
4.9/5
(40)

Most federal courts have interpreted computer records as ____ evidence.

(Multiple Choice)
4.9/5
(40)

Certain files, such as the ____ and Security log in Windows XP, might lose essential network activity records if the power is terminated without a proper shutdown.

(Multiple Choice)
4.8/5
(46)

Match each item with a statement below: -secondhand or indirect evidence, such as an overheard conversation

(Multiple Choice)
4.9/5
(27)

With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)