Exam 4: Policies and Procedures
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
Match the following tools to their uses in the field.
-General case intake form
(Multiple Choice)
4.8/5
(43)
Match the following tools to their uses in the field.
-Gloves
(Multiple Choice)
4.8/5
(33)
Match the following tasks to the proper level of examination.
-Start working with suspect files
(Multiple Choice)
4.8/5
(32)
Why is tagging books and magazines at a crime scene considered important?
(Multiple Choice)
4.7/5
(43)
The ________ of a report contains as much detail and documentation as you can include.
(Short Answer)
4.8/5
(32)
The computer's time and date should be compared against a known standard,such as ________.
(Short Answer)
4.9/5
(43)
Match the following basic tools to their components or uses in the field
-PDA
(Multiple Choice)
4.8/5
(41)
Match the following tasks to the proper level of examination.
-Looking at "scratch pad" areas
(Multiple Choice)
4.7/5
(39)
Match the following factors to their considerations.
-Equipment resources
(Multiple Choice)
4.9/5
(36)
Which of the following would NOT be part of a standard report?
(Multiple Choice)
4.9/5
(47)
Common criteria for accepting a case include all of the following EXCEPT
(Multiple Choice)
4.7/5
(29)
Match the following factors to their considerations.
-Personnel considerations
(Multiple Choice)
4.9/5
(35)
You can use ________ analysis to eliminate common files by comparing them to the same files on your system.
(Short Answer)
5.0/5
(36)
Match the following tasks to the proper level of examination.
-Developing a picture of the system
(Multiple Choice)
4.8/5
(34)
With the original evidence safely stored,you should make a(n)________ of the forensic image.
(Short Answer)
4.8/5
(36)
Match the following questions to their considerations.
-What is the skill level of the user?
(Multiple Choice)
4.8/5
(33)
Place into correct order the steps when conducting an investigation.
-First
(Multiple Choice)
4.9/5
(29)
Which of the following is NOT one of the areas to be considered when selecting members of a forensic unit?
(Multiple Choice)
4.9/5
(40)
Your best bet for decrypting a file is to find out what program was used to encrypt it and obtain the ________ for that software.
(Short Answer)
4.8/5
(36)
The ________ allows police to seize evidence if they see it while lawfully engaged in searching for other evidence.
(Short Answer)
4.9/5
(46)
Showing 41 - 60 of 66
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)