Exam 2: Computer Forensics Anddigital Detective Work

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

________ is created when a file is created if it does not take up an entire sector.

(Short Answer)
4.9/5
(46)

What type of program is available to delete and overwrite data on a computer?

(Multiple Choice)
4.8/5
(43)
Match the criminal with the e-evidence associated with his or her crime.
John Allen Mohammad
Digital recordings on a device in car
Lisa Montgomery
GPS data from car and cell phone
Alejandro Avila
Evidence of child pornography on computer
Correct Answer:
Verified
Premises:
Responses:
John Allen Mohammad
Digital recordings on a device in car
Lisa Montgomery
GPS data from car and cell phone
Alejandro Avila
Evidence of child pornography on computer
Scott Peterson
E-mail communication between criminal and victim
(Matching)
4.9/5
(39)

The emphasis on computer forensics as a(n)________ is important because it recognizes the field as a discipline with set principles.

(Short Answer)
4.9/5
(39)

One of the more popular theories is that a person could actually commit ________ by changing a patient's medication data.

(Short Answer)
5.0/5
(33)
Match the type of crime with its motive.
Illegal gambling
Computer is the crime target
Theft of intellectual property
Computer is the crime instrument
Fraud from computer billings
Computer is incidental to traditional crime
Correct Answer:
Verified
Premises:
Responses:
Illegal gambling
Computer is the crime target
Theft of intellectual property
Computer is the crime instrument
Fraud from computer billings
Computer is incidental to traditional crime
Software piracy
New crime generated by prevalence of computers
(Matching)
4.7/5
(38)

Evidence collected in violation of which amendment will cause the evidence to be excluded?

(Multiple Choice)
4.8/5
(32)

If evidence items are released to auditors or authorities,the ________ should be recorded.

(Short Answer)
4.7/5
(39)

Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)

(Multiple Choice)
4.8/5
(44)

Care,control,and chain of custody are called the ________ of evidence.

(Short Answer)
4.8/5
(42)
Match the type of cybercrime with its description.
Techno-vandalism
Unauthorized access causes damage
Root access
Gives the user Admin rights
Spoofing
Criminal trespass
Correct Answer:
Verified
Premises:
Responses:
Techno-vandalism
Unauthorized access causes damage
Root access
Gives the user Admin rights
Spoofing
Criminal trespass
Techno-trespass
Phony Web sites
(Matching)
4.9/5
(45)

In order to be legally defensible,methods used in the recovery of data must ensure that

(Multiple Choice)
4.8/5
(31)
Showing 21 - 32 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)