Exam 4: Processing Crime and Incident Scenes
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
State public disclosure laws apply to state records, but FOIA allows citizens to request copies of public documents created by federal agencies.
Free
(True/False)
4.9/5
(33)
Correct Answer:
True
Like most common law nations, the United States excludes hearsay as spelled out in the FRE Article VIII, Rule 802. Rules 803 and 804 cite more than 20 exceptions for when hearsay can be used. Provide five examples that apply to digital forensics investigations.
Free
(Essay)
4.9/5
(42)
Correct Answer:
Five examples of hearsay that can be used are:
•Business records, including those of a public agency
•Certain public records and reports
•Evidence of the absence of a business record or entry
•Learned treatises used to question an expert witness
•Statement of the absence of a public record or entry
The ______________ rule states that to prove the content of a written document, recording, or photograph, ordinarily the original writing, recording, or photograph is required.
Free
(Short Answer)
4.8/5
(45)
Correct Answer:
best evidence
Match the terms with the correct definitions?.
-Electronic data that a person creates and saves on a computer or digital device, such as a spreadsheet or word-processing document
(Multiple Choice)
4.8/5
(40)
The ability to obtain a search warrant from a judge that authorizes a search and seizure of specific evidence requires sufficient _______.
(Multiple Choice)
5.0/5
(30)
Describe the steps to take if you discover evidence of a crime during a company policy investigation.
(Essay)
4.8/5
(33)
_______ is the term for a statement that is made by someone other than an actual witness to the event while testifying at a hearing.
(Multiple Choice)
4.9/5
(44)
If practical, _______ team(s) should collect and catalog digital evidence at a crime scene or lab.
(Multiple Choice)
4.8/5
(44)
As a general rule, what should be done by forensics experts when a suspect computer is seized in a powered-on state?
(Multiple Choice)
4.8/5
(37)
Match the terms with the correct definitions?.
-?Data the system maintains, such as system log files and proxy server logs
(Multiple Choice)
4.7/5
(37)
In the United States, ____________ and similar agencies must comply with state public disclosure and federal Freedom of Information Act (FOIA) laws, and make certain documents available as public records.
(Short Answer)
4.8/5
(33)
Compare and contrast hashing methods using a keyed hash set and a nonkeyed hash set.
(Essay)
4.9/5
(33)
Instead of producing hard disks in court, attorneys can submit ______ copies of files as evidence.
(Short Answer)
4.8/5
(40)
The plain view doctrine states that objects falling in the direct sight of an officer who has the right to be in a location are subject to seizure without a warrant and can be introduced into evidence. Provide the three criteria that must be met in order for the plain view doctrine to apply.
(Essay)
4.8/5
(23)
Match the terms with the correct definitions?.
-?A unique hash number generated by a software tool and used to identify files
(Multiple Choice)
4.8/5
(41)
Which court case established that it is not necessary for computer programmers to testify in order to authenticate computer-generated records?
(Multiple Choice)
5.0/5
(37)
_______ are a special category of private sector businesses, due to their ability to investigate computer abuse committed by employees only, but not customers.
(Multiple Choice)
4.9/5
(30)
When seizing digital evidence in criminal investigations, whose standards should be followed??
(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)