Exam 17: Computer Crime and Digital Forensics
Exam 1: The Information Age in Which You Live: Changing the Face of Business140 Questions
Exam 2: Major Business Initiatives: Gaining Competitive Advantage With It121 Questions
Exam 3: Databases and Data Warehouses: Supporting the Analytics-Driven Organization120 Questions
Exam 4: Analytics, Decision Support, and Artificial Intelligence: Brain-Power for Your Business124 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy128 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques138 Questions
Exam 7: Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise125 Questions
Exam 8: Protecting People and Information: Threats and Safeguards126 Questions
Exam 9: Emerging Trends and Technologies: Business, People, and Technology Tomorrow120 Questions
Exam 10: Computer Hardware and Software125 Questions
Exam 11: The World Wide Web and the Internet125 Questions
Exam 12: Designing Databases and Entity-Relationship Diagramming100 Questions
Exam 13: Decision Analysis With Spreadsheet Software117 Questions
Exam 14: Network Basics125 Questions
Exam 15: Building a Web Page With Html110 Questions
Exam 16: Object-Oriented Technologies112 Questions
Exam 17: Computer Crime and Digital Forensics125 Questions
Exam 18: Building an E-Portfolio137 Questions
Exam 19: Implementing a Database With Microsoft Access129 Questions
Exam 20: Careers in Business132 Questions
Exam 21: Building Web Sites With Front-page125 Questions
Exam 22: Programming in Excel With VBA125 Questions
Select questions type
_____ refer to knowledgeable computer users who use their knowledge to invade other people's computers.
Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
C
Forensic software can sometimes view the contents of a file without opening the file.
Free
(True/False)
4.8/5
(40)
Correct Answer:
True
Erasing information by wiping a disk can be done in less than 30 seconds.
Free
(True/False)
4.8/5
(33)
Correct Answer:
False
A(n)_____ attack is one where hackers overwhelm a computer system or network with so many requests that the system goes down or crashes.
(Multiple Choice)
4.8/5
(32)
Companies provide education in computer forensics to employees in order to conduct internal investigations properly.
(True/False)
4.9/5
(33)
The EnCase program helps investigators find a wealth of information on storage media.
(True/False)
4.9/5
(28)
Tracy recently received an e-mail from a friend,Alice.However,she later got to know from Alice that she had not sent the e-mail.A couple of days later,Tracy's system crashed and she lost all important files from her system.In such a situation,Tracy is MOST likely to be a victim of ____.
(Multiple Choice)
4.9/5
(38)
The advantage of undertaking forensic investigations on smartphones is that they run on a range of software that varies from company to company.
(True/False)
4.9/5
(33)
A basic motivation for engaging in digital forensics is to gather and preserve evidence to present in court.
(True/False)
4.8/5
(37)
A _____ is a computer program that runs automatically and which can perform all kinds of tasks,both good and bad.
(Short Answer)
4.8/5
(31)
Which of the following is the most prevalent computer virus?
(Multiple Choice)
5.0/5
(33)
A computer infected with bots that can run automatically by themselves and that is part of a botnet is known as a _____ computer.
(Multiple Choice)
4.7/5
(32)
Malware bots are programs that can detect virus attacks and launch a counterattack.
(Short Answer)
4.8/5
(41)
A ping is a standard operation that networks use to check that all computers are functioning properly.
(True/False)
4.8/5
(32)
A _____ is a computer virus that replicates and spreads itself,not only from file to file,but from computer to computer via e-mail and other Internet traffic.
(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 125
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)