Exam 12: Federal Rules and Criminal Codes
Exam 1: Forensic Evidence and Crime Investigation40 Questions
Exam 2: Computer Forensics Anddigital Detective Work32 Questions
Exam 3: Tools, Environments, Equipment, and Certifications50 Questions
Exam 4: Policies and Procedures66 Questions
Exam 5: Data, PDA, and Cell Phone Forensics46 Questions
Exam 6: Operating Systems and Data Transmission Basics for Digital Investigations54 Questions
Exam 7: Investigating Windows, linux, and Graphic Files59 Questions
Exam 8: E-Mail and Webmail Forensics49 Questions
Exam 9: Internet and Network Forensics and Intrusion Detection41 Questions
Exam 10: Tracking Down Those Who Intend to Do Harm on a Large Scale40 Questions
Exam 11: Fraud and Forensic Accounting Investigation41 Questions
Exam 12: Federal Rules and Criminal Codes51 Questions
Exam 13: Ethical and Professional Responsibility in Testimony31 Questions
Select questions type
________ can reveal a person's location using information from cell phone and cellular service provider.
(Short Answer)
4.9/5
(33)
Match the following terms to when they are used.
-Pen register
(Multiple Choice)
4.9/5
(43)
Match the following exclusionary rules to their descriptions.
-Opinion of expert
(Multiple Choice)
4.7/5
(37)
Rules that state what types of evidence can or cannot be presented in court are referred to as ________ rules.
(Short Answer)
4.8/5
(29)
Match the following exclusionary rules to their descriptions.
Premises:
Relevancy
Responses:
Qualified experts may testify though not eyewitnesses
The evidence is valuable to an issue of the case
Ruling against "out of court" statements
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(43)
The ________ has been used to prosecute virus creators,hackers,identity thieves,and persons who use computers to commit fraud.
(Short Answer)
4.8/5
(28)
Match the following legislation to a feature of the legislation.
Premises:
Electronic Communications Privacy Act
Responses:
Permits an ISP to look through stored e-mail messages
Forces ISPs to turn over names of suspected music pirates upon subpoena
Requires that recordings be handed over to a judge
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(31)
Match the definition to its Federal Rule of Evidence.
-Rule 104(a)
(Multiple Choice)
4.9/5
(40)
A motion by a lawyer before trial to determine whether or not evidence is admissible is called a(n)________.
(Short Answer)
4.8/5
(36)
What amendment must a law enforcement office check before seizing hardware or computers?
(Multiple Choice)
4.9/5
(41)
Examples of circumstantial evidence that can be used to authenticate a physical document include all of the following EXCEPT
(Multiple Choice)
4.7/5
(40)
Match the following legislation to a feature of the legislation.
-Federal Wiretap Statute
(Multiple Choice)
4.8/5
(28)
Criminal and civil cases follow federal or state rules to prevent any ________,or unequal,treatment.
(Short Answer)
4.9/5
(39)
Match the following legislation to a feature of the legislation.
-Digital Millennium Copyright Act
(Multiple Choice)
4.7/5
(31)
The same circumstantial evidence the courts use to authenticate physical documents applies to ________ as well.
(Short Answer)
4.7/5
(44)
The act that can sometimes take precedence over the right to privacy guaranteed by the Fourth Amendment is the
(Multiple Choice)
4.8/5
(40)
Which of the following acts greatly broadened the FBI's authority to gather evidence from telephone conversations,e-mail,pagers,and other forms of electronic communication?
(Multiple Choice)
4.8/5
(32)
Under the Federal Rules of Civil Procedure,which two rules regulate the production of evidence?
(Multiple Choice)
4.7/5
(34)
Showing 21 - 40 of 51
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)