Exam 4: Policies and Procedures
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
You should ask questions about what types of ________ and ________ are involved because you can save time and mistakes if you take the correct equipment with you.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
hardware,software
Match the following terms to their reporting definition.
-Conclusion
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
C
Training of forensic personnel might include which of the following?
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
D
Match the following tools to their uses in the field.
-Sharpie
(Multiple Choice)
4.9/5
(36)
Place into correct order the steps when conducting an investigation.
-Fourth
(Multiple Choice)
4.8/5
(38)
Match the type of file with the definition:
-Encrypted files
(Multiple Choice)
4.8/5
(36)
Match the following terms to their reporting definition.
-Summary
(Multiple Choice)
4.8/5
(35)
Forensic investigators establish generally accepted policies and procedures to ensure that
(Multiple Choice)
4.7/5
(46)
Match the type of file with the definition:
Premises:
Password protected
Responses:
Usually mail files
Data hides in another file
Uses an algorithm to make readable
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(35)
If you encounter files that have been password protected,one option is to
(Multiple Choice)
5.0/5
(43)
Match the following tasks to the proper level of examination.
-Looking for protected files
(Multiple Choice)
4.8/5
(29)
Match the following questions to their considerations.
Premises:
What am I looking for?
Responses:
There may be fingerprints or other trace evidence
The more skilled the user, the more likely it is that he can alter or destroy evidence
You would use different tools to locate different items such as photographs or spreadsheets
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(31)
Match the following questions to their considerations.
-What kind of hardware is involved?
(Multiple Choice)
4.8/5
(36)
Match the type of file with the definition:
-Compressed files
(Multiple Choice)
4.8/5
(30)
Which of the following is NOT an item generally included in a forensic kit?
(Multiple Choice)
4.9/5
(25)
Match the following terms to their reporting definition.
-Supplementary materials
(Multiple Choice)
5.0/5
(42)
A(n)________ examination involves searches of the areas the operating system does not recognize as being normally used.
(Short Answer)
4.7/5
(46)
Which of the following is one of the bottom-layer examinations you would make on a suspect computer?
(Multiple Choice)
4.7/5
(28)
Match the following tools to their uses in the field.
-Log book
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 66
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)