Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
________ logs help track down criminals because they hold evidence that a crime has been committed and where the intrusion occurred.
(Short Answer)
4.8/5
(39)
________ refers to the digital coordination of an integrated plan stretching across geographical boundaries that may or may not result in bloodshed.
(Short Answer)
5.0/5
(34)
What is considered to be the first step in cyber investigations?
(Multiple Choice)
4.9/5
(35)
Cybercriminals are using hijacked computers to perform which of the following feats?
(Multiple Choice)
4.8/5
(44)
Match the virus with its estimated cost damages.
-Nachi and friends
(Multiple Choice)
5.0/5
(28)
What bank was found to be hosting an attack unknowingly against another?
(Multiple Choice)
4.9/5
(36)
Studying examples of attacks and malicious applications will NOT help forensics investigators
(Multiple Choice)
4.9/5
(48)
________ are large groupings of hacked,remote-controlled computers used to distribute and install software.
(Short Answer)
4.7/5
(41)
Based on verified e-evidence,it was concluded that Aaron Caffrey
(Multiple Choice)
4.8/5
(39)
David Smith and VicodinES both signed off using the word ________.
(Short Answer)
4.8/5
(38)
A(n)________ program reads from one port and writes to another.
(Short Answer)
4.8/5
(31)
Anonymity,control resources,and many other features make the ________ the criminals' conduit for coordinating and carrying out an agenda.
(Short Answer)
4.9/5
(43)
Instrumental in tracing the Melissa virus's origins were unique hardware numbers,known as ________,that were stored in Office 97 document files.
(Short Answer)
4.9/5
(45)
Match the virus with its estimated cost damages.
Premises:
Sircam
Responses:
million
billion
billion
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(38)
________ kits were used by identity thieves to convince Chase Bank customers to supply financial information.
(Short Answer)
4.7/5
(38)
Showing 21 - 40 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)