Exam 2: Computer Forensics Anddigital Detective Work
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Criminals whose purpose is ________ need to brag about their exploits because they are motivated by a desire for fame or notoriety.
Free
(Short Answer)
4.9/5
(36)
Correct Answer:
trophy hunting
The chain of custody must include which of the following items?
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
In what manner were e-commerce employees caught making online purchases using clients' credit card numbers?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
D
Which of the following is NOT considered one of the five stages of a computer investigation?
(Multiple Choice)
4.9/5
(43)
In 2005,the estimated number of e-mail users in the United States was
(Multiple Choice)
4.8/5
(35)
Which of the following traditional crimes are easier because of widespread computer access?
(Multiple Choice)
4.9/5
(31)
Criminal trials are often preceded by a(n)________ at which the admissibility of evidence is determined.
(Short Answer)
4.9/5
(36)
The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.
(Short Answer)
4.8/5
(40)
________ is a term generally used to indicate a message is hidden within another file.
(Short Answer)
4.7/5
(31)
Which of the following is NOT considered an objective in ensuring probative information is recovered?
(Multiple Choice)
4.8/5
(40)
According to a 2003 survey,________ and China had the highest piracy rates.
(Short Answer)
4.9/5
(39)
Evidence may be suppressed if which of the following occurs?
(Multiple Choice)
4.8/5
(33)
________ is the blending of accounting,auditing,and investigative skills.
(Short Answer)
4.9/5
(26)
The ________ is documentation that the evidence was handled and preserved properly.
(Short Answer)
4.8/5
(41)
What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?
(Multiple Choice)
4.9/5
(38)
A(n)________ is a reasonable belief that a person has committed a crime.
(Short Answer)
4.7/5
(52)
Match the term with its definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(33)
In the case in which a hacker named Maxim broke into CD Universe credit card files,the FBI and company employees accessed original files to determine how the intrusion had occurred.What was the impact on the case of working with original files?
(Multiple Choice)
4.8/5
(42)
Which of the following is NOT considered one of the items e-evidence is currently being used for?
(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)