Exam 17: Computer Crime and Digital Forensics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

EnCase and FTK are examples of _____ software.

(Short Answer)
4.7/5
(34)

_____ refers to conning one's way into acquiring information that one has no right to.

(Short Answer)
4.7/5
(29)

A collection of computers that have been infected with blocks of code that can run automatically by themselves is known as a ____.

(Multiple Choice)
4.8/5
(29)

Digital forensics experts are called in to help solve crimes such as terrorist activities and political scandals.

(True/False)
4.7/5
(38)

A file deleted from a hard disk goes into the _____ from which it can be recovered later.

(Short Answer)
4.7/5
(38)

Excel allows users to protect their files by:

(Multiple Choice)
4.9/5
(33)

As part of a class project,David has been asked by his professor to read up on any social issue.On typing "social issues" into a search engine on the system. ,it displayed many terms including children's rights,environmental issues,women's rights,etc.This occurred because of a software in the system which uses a neural network to find other terms closely related to the search term.In such a scenario,the software is using ____.

(Multiple Choice)
4.8/5
(31)

Encryption scrambles the contents of a file so that one cannot read it without the right ______.

(Short Answer)
4.8/5
(50)

_____ refers to space that is marked as available for storage.

(Short Answer)
4.9/5
(31)

A Storm botnet is a virus detection program.

(True/False)
4.8/5
(36)

The _____ Act requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.

(Short Answer)
4.9/5
(42)

MD5 hash values are stronger than SHA hash values because their character string is longer.

(True/False)
4.7/5
(32)

Anti-forensic tools fall into three categories,i.e. ,configuration settings,third-party tools,and forensic defeating software.

(True/False)
4.8/5
(40)

A computer virus is a _____ that was written with malicious intent to cause annoyance or damage.

(Short Answer)
4.9/5
(42)

_____ refer to those who are hired to engage in electronic corporate espionage and other profitable ventures.

(Multiple Choice)
4.9/5
(34)

Which of the following is a Visual Basic script virus?

(Multiple Choice)
4.7/5
(25)

The latest worms are Visual Basic script viruses which cannot run on computers that run Win32 programs.

(True/False)
4.7/5
(33)

What is the first phase of investigation in digital forensics?

(Multiple Choice)
4.9/5
(35)

Which of the following refers to an authentication coding system that experts use to show sometime in the future that no entry or file has changed in the interim?

(Multiple Choice)
4.8/5
(39)

Which of the following is a tool that makes it hard or impossible to trace user activity or access data in files?

(Multiple Choice)
4.7/5
(32)
Showing 81 - 100 of 125
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)