Exam 17: Computer Crime and Digital Forensics
Exam 1: The Information Age in Which You Live: Changing the Face of Business140 Questions
Exam 2: Major Business Initiatives: Gaining Competitive Advantage With It121 Questions
Exam 3: Databases and Data Warehouses: Supporting the Analytics-Driven Organization120 Questions
Exam 4: Analytics, Decision Support, and Artificial Intelligence: Brain-Power for Your Business124 Questions
Exam 5: Electronic Commerce: Strategies for the New Economy128 Questions
Exam 6: Systems Development: Phases, Tools, and Techniques138 Questions
Exam 7: Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning: Building and Sustaining the Dynamic Enterprise125 Questions
Exam 8: Protecting People and Information: Threats and Safeguards126 Questions
Exam 9: Emerging Trends and Technologies: Business, People, and Technology Tomorrow120 Questions
Exam 10: Computer Hardware and Software125 Questions
Exam 11: The World Wide Web and the Internet125 Questions
Exam 12: Designing Databases and Entity-Relationship Diagramming100 Questions
Exam 13: Decision Analysis With Spreadsheet Software117 Questions
Exam 14: Network Basics125 Questions
Exam 15: Building a Web Page With Html110 Questions
Exam 16: Object-Oriented Technologies112 Questions
Exam 17: Computer Crime and Digital Forensics125 Questions
Exam 18: Building an E-Portfolio137 Questions
Exam 19: Implementing a Database With Microsoft Access129 Questions
Exam 20: Careers in Business132 Questions
Exam 21: Building Web Sites With Front-page125 Questions
Exam 22: Programming in Excel With VBA125 Questions
Select questions type
_____ refers to conning one's way into acquiring information that one has no right to.
(Short Answer)
4.7/5
(29)
A collection of computers that have been infected with blocks of code that can run automatically by themselves is known as a ____.
(Multiple Choice)
4.8/5
(29)
Digital forensics experts are called in to help solve crimes such as terrorist activities and political scandals.
(True/False)
4.7/5
(38)
A file deleted from a hard disk goes into the _____ from which it can be recovered later.
(Short Answer)
4.7/5
(38)
As part of a class project,David has been asked by his professor to read up on any social issue.On typing "social issues" into a search engine on the system. ,it displayed many terms including children's rights,environmental issues,women's rights,etc.This occurred because of a software in the system which uses a neural network to find other terms closely related to the search term.In such a scenario,the software is using ____.
(Multiple Choice)
4.8/5
(31)
Encryption scrambles the contents of a file so that one cannot read it without the right ______.
(Short Answer)
4.8/5
(50)
_____ refers to space that is marked as available for storage.
(Short Answer)
4.9/5
(31)
The _____ Act requires companies to implement extensive and detailed policies to prevent illegal activity within the company and respond in a timely manner to investigate illegal activity.
(Short Answer)
4.9/5
(42)
MD5 hash values are stronger than SHA hash values because their character string is longer.
(True/False)
4.7/5
(32)
Anti-forensic tools fall into three categories,i.e. ,configuration settings,third-party tools,and forensic defeating software.
(True/False)
4.8/5
(40)
A computer virus is a _____ that was written with malicious intent to cause annoyance or damage.
(Short Answer)
4.9/5
(42)
_____ refer to those who are hired to engage in electronic corporate espionage and other profitable ventures.
(Multiple Choice)
4.9/5
(34)
The latest worms are Visual Basic script viruses which cannot run on computers that run Win32 programs.
(True/False)
4.7/5
(33)
What is the first phase of investigation in digital forensics?
(Multiple Choice)
4.9/5
(35)
Which of the following refers to an authentication coding system that experts use to show sometime in the future that no entry or file has changed in the interim?
(Multiple Choice)
4.8/5
(39)
Which of the following is a tool that makes it hard or impossible to trace user activity or access data in files?
(Multiple Choice)
4.7/5
(32)
Showing 81 - 100 of 125
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)