Exam 2: Computer Forensics Anddigital Detective Work
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
________ is created when a file is created if it does not take up an entire sector.
(Short Answer)
4.9/5
(46)
What type of program is available to delete and overwrite data on a computer?
(Multiple Choice)
4.8/5
(43)
Match the criminal with the e-evidence associated with his or her crime.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(39)
The emphasis on computer forensics as a(n)________ is important because it recognizes the field as a discipline with set principles.
(Short Answer)
4.9/5
(39)
One of the more popular theories is that a person could actually commit ________ by changing a patient's medication data.
(Short Answer)
5.0/5
(33)
Match the type of crime with its motive.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(38)
Evidence collected in violation of which amendment will cause the evidence to be excluded?
(Multiple Choice)
4.8/5
(32)
If evidence items are released to auditors or authorities,the ________ should be recorded.
(Short Answer)
4.7/5
(39)
Robert Hanssen stored documents he was stealing from the FBI and selling to the Russians on a(n)
(Multiple Choice)
4.8/5
(44)
Care,control,and chain of custody are called the ________ of evidence.
(Short Answer)
4.8/5
(42)
Match the type of cybercrime with its description.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(45)
In order to be legally defensible,methods used in the recovery of data must ensure that
(Multiple Choice)
4.8/5
(31)
Showing 21 - 32 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)