Exam 4: Processing Crime and Incident Scenes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

​What does FRE stand for?

(Multiple Choice)
4.7/5
(38)

​The ____________________ doesn't extend to supporting a general exploratory search from one object to another unless something incriminating is found.

(Short Answer)
4.8/5
(35)

Match the terms with the correct definitions?. -The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest

(Multiple Choice)
4.8/5
(35)

Which of the following is not done when preparing for a case?​

(Multiple Choice)
4.9/5
(34)

At a scene, technical advisors can help direct other investigators to collect evidence correctly. List the responsibilities of technical advisors.

(Essay)
4.8/5
(44)

An emergency situation under the PATRIOT Act is defined as the immediate risk of death or personal ​injury, such as finding a bomb threat in an e-mail.

(True/False)
4.9/5
(38)

To investigate employees suspected of improper use of company digital assets, a company policy statement about misuse of digital assets allows corporate investigators to conduct covert surveillance with little or no cause, and access company computer systems and digital devices without a warrant.​

(True/False)
4.9/5
(35)

What should you do while copying data on a suspect's computer that is still live?​

(Multiple Choice)
4.8/5
(42)

A _______ is not ​a private sector organization.

(Multiple Choice)
4.9/5
(37)

To verify data integrity, different methods of obtaining a unique identity for file data have been developed. Explain how you can use Cyclic Redundancy Check (CRC) and Message Digest 5 (MD5)​​ for this purpose.

(Essay)
4.8/5
(40)

The term _______ describes rooms filled with extremely large disk systems that are typically used by large business data centers.

(Multiple Choice)
4.8/5
(34)

Match the terms with the correct definitions?. -?An algorithm that produces a hexadecimal value of a file or storage media; used to determine whether data has changed

(Multiple Choice)
4.8/5
(34)

_______ does not recover data in free or slack space.

(Multiple Choice)
4.7/5
(40)

​ ________________ can be any information stored or transmitted in digital form.​

(Short Answer)
4.9/5
(39)

After you record the scene and shut down the system, you bag and tag the evidence. Describe the steps to follow for bagging and tagging evidence.?

(Essay)
4.8/5
(45)

Consistent practices help verify your work and enhance your credibility, so you must handle all evidence consistently. Explain why it's important to apply the same security and accountability controls for evidence in a civil lawsuit as in a major crime.

(Essay)
5.0/5
(33)

Match the terms with the correct definitions?. -A mathematic algorithm that translates a file into a unique hexadecimal value

(Multiple Choice)
4.9/5
(37)

Match the terms with the correct definitions?. -?A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers

(Multiple Choice)
4.8/5
(28)

Match the terms with the correct definitions?. -Detecting data transmissions to and from a suspect's computer? and a network server to determine the type of data being transmitted over a network

(Multiple Choice)
4.8/5
(47)

The Fourth Amendment states that only warrants "particularly describing the place to be searched and the persons ​or things to be seized" can be issued. The courts have determined that this phrase means a warrant can authorize a search of a specific place for ​anything.​

(True/False)
4.8/5
(36)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)