Exam 4: Processing Crime and Incident Scenes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

State public disclosure laws apply to state records, but FOIA allows citizens to request copies of public documents created by federal agencies.​

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

True

Like most common law nations, the United States excludes hearsay as spelled out in the FRE Article VIII, Rule 802. Rules 803 and 804 cite more than 20 exceptions for when hearsay can​ be used. Provide five examples that apply to digital forensics investigations.

Free
(Essay)
4.9/5
(42)
Correct Answer:
Verified

Five examples of hearsay that can be used are:
•​Business records, including those of a public agency
•Certain public records and reports
•Evidence of the absence of a business record or entry
•Learned treatises used to question an expert witness
•Statement of the absence of a public record or entry

The ______________ rule states that to prove the content of a written document, recording, or photograph, ordinarily the original writing, recording, or photograph is required.

Free
(Short Answer)
4.8/5
(45)
Correct Answer:
Verified

best evidence

What type of media has a 30-year lifespan?​

(Multiple Choice)
4.8/5
(42)

Match the terms with the correct definitions?. -Electronic data that a person creates and saves on a computer or digital device, such as a spreadsheet or word-processing document

(Multiple Choice)
4.8/5
(40)

The ability to obtain a search warrant from a judge that authorizes a search and seizure of specific evidence requires sufficient _______.​

(Multiple Choice)
5.0/5
(30)

Describe the steps to take if you discover evidence of a crime during a company policy investigation​.

(Essay)
4.8/5
(33)

_______ is the term for a statement that is made by someone other than an actual witness to the event while testifying at a hearing.

(Multiple Choice)
4.9/5
(44)

If practical, _______ team(s) should collect and catalog digital evidence at a crime scene or lab.

(Multiple Choice)
4.8/5
(44)

​As a general rule, what should be done by forensics experts when a suspect computer is seized in a powered-on state?

(Multiple Choice)
4.8/5
(37)

You must abide by the _______ while collecting evidence.

(Multiple Choice)
5.0/5
(38)

Match the terms with the correct definitions?. -?Data the system maintains, such as system log files and proxy server logs

(Multiple Choice)
4.7/5
(37)

In the United States, ____________ and similar agencies must comply with state public disclosure and federal Freedom of Information Act (FOIA) laws, and make certain documents available as public records.

(Short Answer)
4.8/5
(33)

Compare and contrast hashing methods using a ​keyed hash set​ and a ​nonkeyed hash set​.

(Essay)
4.9/5
(33)

Instead of producing hard disks in court, attorneys can submit ______ copies of files as evidence.​

(Short Answer)
4.8/5
(40)

​The plain view doctrine states that objects falling in the direct sight of an officer who has the right to be in a location are subject to seizure without a warrant and can be introduced into evidence. Provide the three criteria that must be met in order for the plain view doctrine to apply.

(Essay)
4.8/5
(23)

Match the terms with the correct definitions?. -?A unique hash number generated by a software tool and used to identify files

(Multiple Choice)
4.8/5
(41)

Which court case established that it is not necessary for computer programmers to testify in order to authenticate computer-generated records?​

(Multiple Choice)
5.0/5
(37)

_______ are a special category of private sector businesses, due to their ability to investigate computer abuse committed by employees only, but not customers.

(Multiple Choice)
4.9/5
(30)

When seizing digital evidence in criminal investigations, whose standards should be followed??

(Multiple Choice)
4.7/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)