Exam 2: Computer Forensics Anddigital Detective Work

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Criminals whose purpose is ________ need to brag about their exploits because they are motivated by a desire for fame or notoriety.

Free
(Short Answer)
4.9/5
(36)
Correct Answer:
Verified

trophy hunting

The chain of custody must include which of the following items?

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A

In what manner were e-commerce employees caught making online purchases using clients' credit card numbers?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

D

Which of the following is NOT considered one of the five stages of a computer investigation?

(Multiple Choice)
4.9/5
(43)

Hackers go after valuable content such as

(Multiple Choice)
4.8/5
(40)

In 2005,the estimated number of e-mail users in the United States was

(Multiple Choice)
4.8/5
(35)

Which of the following traditional crimes are easier because of widespread computer access?

(Multiple Choice)
4.9/5
(31)

Criminal trials are often preceded by a(n)________ at which the admissibility of evidence is determined.

(Short Answer)
4.9/5
(36)

The ________ states that evidence collected in violation of the Fourth Amendment cannot be used in a trial.

(Short Answer)
4.8/5
(40)

________ is a term generally used to indicate a message is hidden within another file.

(Short Answer)
4.7/5
(31)

Which of the following is NOT considered an objective in ensuring probative information is recovered?

(Multiple Choice)
4.8/5
(40)

According to a 2003 survey,________ and China had the highest piracy rates.

(Short Answer)
4.9/5
(39)

Evidence may be suppressed if which of the following occurs?

(Multiple Choice)
4.8/5
(33)

________ is the blending of accounting,auditing,and investigative skills.

(Short Answer)
4.9/5
(26)

The ________ is documentation that the evidence was handled and preserved properly.

(Short Answer)
4.8/5
(41)

What unique piece of evidence finally gave police the break they'd needed in order to solve the BTK serial murderer case?

(Multiple Choice)
4.9/5
(38)

A(n)________ is a reasonable belief that a person has committed a crime.

(Short Answer)
4.7/5
(52)
Match the term with its definition.
Sector
Smallest unit that can be accessed on a disk
Unallocated space
Remnant area at the end of a file
Slack space
Fixed block of data such as 1024 bytes
Correct Answer:
Verified
Premises:
Responses:
Sector
Smallest unit that can be accessed on a disk
Unallocated space
Remnant area at the end of a file
Slack space
Fixed block of data such as 1024 bytes
Cluster
Space not currently used to store an active file
(Matching)
4.8/5
(33)

In the case in which a hacker named Maxim broke into CD Universe credit card files,the FBI and company employees accessed original files to determine how the intrusion had occurred.What was the impact on the case of working with original files?

(Multiple Choice)
4.8/5
(42)

Which of the following is NOT considered one of the items e-evidence is currently being used for?

(Multiple Choice)
4.9/5
(36)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)