Exam 19: Computer Forensics
Exam 1: Introduction106 Questions
Exam 2: The Crime Scene131 Questions
Exam 3: Physical Evidence72 Questions
Exam 4: Crime Scene Reconstruction: Blood Stain Pattern Analysis89 Questions
Exam 5: Death Investigation108 Questions
Exam 6: Fingerprints101 Questions
Exam 7: Forensic Biometrics83 Questions
Exam 8: The Microscope88 Questions
Exam 9: Firearms, tool Marks, and Other Impressions81 Questions
Exam 10: Matter, light, and Glass Examination106 Questions
Exam 11: Hairs and Fibers101 Questions
Exam 12: Drugs127 Questions
Exam 13: Forensic Toxicology92 Questions
Exam 14: Metals, paint, and Soil84 Questions
Exam 15: Forensic Serology77 Questions
Exam 16: DNA: the Indispensable Forensic Science Tool97 Questions
Exam 17: Forensic Aspects of Fire and Explosion Investigation126 Questions
Exam 18: Document Examination58 Questions
Exam 19: Computer Forensics98 Questions
Exam 20: Mobile Device Forensics69 Questions
Select questions type
What type of memory stores software programs and instructions while the computer is turned on?
What special considerations must be taken to preserve this type of memory on a computer at a crime scene?
(Essay)
4.7/5
(37)
Evidentiary data may be recovered from which of the following?
(Multiple Choice)
4.9/5
(33)
The primary form of data storage within a personal computer is:
(Multiple Choice)
4.8/5
(33)
Visible data exists in areas of the drive that are,generally speaking,unknown and inaccessible to most end users.
(True/False)
4.8/5
(37)
The boot (start-up)process for a computer is controlled by:
(Multiple Choice)
4.8/5
(28)
Name two situations in which an investigator would not immediately unplug a computer at an electronic crime scene.
(Essay)
5.0/5
(36)
The primary storage device on most computers is the hard disk drive (HDD).
(True/False)
4.8/5
(32)
What aspects of a computer should be photographed close-up at an electronic crime scene?
(Essay)
5.0/5
(45)
A software algorithm used to create a "fingerprint" of a file or an entire HDD is called:
(Multiple Choice)
4.9/5
(40)
One of the most common places to begin to look for evidential data is in:
(Multiple Choice)
4.8/5
(36)
Often mobile devices contain the same Internet artifacts as a computer,such as cookies and browser history.
(True/False)
4.8/5
(34)
Most web browsers use a(n)________ to expedite and streamline browsing.
(Multiple Choice)
4.9/5
(40)
A(n)________ address is a unique address given to every computer connected to the Internet.
(Short Answer)
4.9/5
(38)
The central processing unit,or CPU,is the part of the computer that actually computes.
(True/False)
4.9/5
(38)
The travel history of a suspect can be documented using ________ and map data from a mobile device.
(Short Answer)
4.9/5
(36)
What keeps track of the location of files and folders on the HDD?
(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 98
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)