Exam 17: Computer Crime and Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ refer to knowledgeable computer users who use their knowledge to invade other people's computers.

Free
(Multiple Choice)
4.7/5
(36)
Correct Answer:
Verified

C

Forensic software can sometimes view the contents of a file without opening the file.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

True

Erasing information by wiping a disk can be done in less than 30 seconds.

Free
(True/False)
4.8/5
(33)
Correct Answer:
Verified

False

A(n)_____ attack is one where hackers overwhelm a computer system or network with so many requests that the system goes down or crashes.

(Multiple Choice)
4.8/5
(32)

Unused space results from rearranging disk space.

(True/False)
4.7/5
(35)

Companies provide education in computer forensics to employees in order to conduct internal investigations properly.

(True/False)
4.9/5
(33)

What is the objective of a denial-of-service (DoS)attack?

(Multiple Choice)
4.9/5
(39)

The EnCase program helps investigators find a wealth of information on storage media.

(True/False)
4.9/5
(28)

Tracy recently received an e-mail from a friend,Alice.However,she later got to know from Alice that she had not sent the e-mail.A couple of days later,Tracy's system crashed and she lost all important files from her system.In such a situation,Tracy is MOST likely to be a victim of ____.

(Multiple Choice)
4.9/5
(38)

The advantage of undertaking forensic investigations on smartphones is that they run on a range of software that varies from company to company.

(True/False)
4.9/5
(33)

Which of the following is true of the Stuxnet worm?

(Multiple Choice)
4.8/5
(27)

A forensic image copy is also known as a(n)____.

(Short Answer)
4.9/5
(31)

A basic motivation for engaging in digital forensics is to gather and preserve evidence to present in court.

(True/False)
4.8/5
(37)

White-hat hackers are also known as _____ testers.

(Short Answer)
4.7/5
(32)

A _____ is a computer program that runs automatically and which can perform all kinds of tasks,both good and bad.

(Short Answer)
4.8/5
(31)

Which of the following is the most prevalent computer virus?

(Multiple Choice)
5.0/5
(33)

A computer infected with bots that can run automatically by themselves and that is part of a botnet is known as a _____ computer.

(Multiple Choice)
4.7/5
(32)

Malware bots are programs that can detect virus attacks and launch a counterattack.

(Short Answer)
4.8/5
(41)

A ping is a standard operation that networks use to check that all computers are functioning properly.

(True/False)
4.8/5
(32)

A _____ is a computer virus that replicates and spreads itself,not only from file to file,but from computer to computer via e-mail and other Internet traffic.

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 125
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)