Exam 5: Processing Crime and Incident Scenes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What should you do when working on an Internet investigation and the suspect's computer is on?

(Essay)
4.8/5
(37)

Describe the process of preparing an investigation team.

(Essay)
4.9/5
(36)

Describe how to use a journal when processing a major incident or crime scene.

(Essay)
4.7/5
(39)

When an investigator finds a mix of information, judges often issue a(n) _________________________ to the warrant, which allows the police to separate innocent information from evidence.

(Short Answer)
4.8/5
(33)

Briefly describe the process of obtaining a search warrant.

(Essay)
4.8/5
(38)

Match each item with a statement below: -covert surveillance product

(Multiple Choice)
4.9/5
(40)

If a corporate investigator follows police instructions to gather additional evidence without a search warrant after you have reported the crime, you run the risk of becoming an agent of law enforcement.

(True/False)
4.8/5
(43)

How can you secure a computer incident or crime scene?

(Essay)
4.9/5
(41)

____ records are data the system maintains, such as system log files and proxy server logs.

(Multiple Choice)
4.8/5
(33)

Corporate investigators always have the authority to seize all computers equipments during a corporate investigation.

(True/False)
4.9/5
(40)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)