Exam 4: Processing Crime and Incident Scenes
Exam 1: Understanding the Digital Forensics Profession and Investigations50 Questions
Exam 2: The Investigators Office and Laboratory50 Questions
Exam 3: Data Acquisition50 Questions
Exam 4: Processing Crime and Incident Scenes50 Questions
Exam 5: Working With Windows and Cli Systems50 Questions
Exam 6: Current Computer Forensics Tools50 Questions
Exam 7: Macintosh and Linux Boot Processes and File Systems48 Questions
Exam 8: Recovering Graphics Files49 Questions
Exam 9: Computer Forensics Analysis and Validation50 Questions
Exam 10: Virtual Machine and Cloud Forensics50 Questions
Exam 11: Live Acquisitions and Network Forensics50 Questions
Exam 12: Email Investigations50 Questions
Exam 13: Cell Phone and Mobile Device Forensics49 Questions
Exam 14: Report Writing for High Tech Investigations50 Questions
Exam 15: Expert Testimony in High Tech Investigations50 Questions
Exam 16: Ethics for the Investigator and Expert Witness50 Questions
Select questions type
The ____________________ doesn't extend to supporting a general exploratory search from one object to another unless something incriminating is found.
(Short Answer)
4.8/5
(35)
Match the terms with the correct definitions?.
-The standard specifying whether a police officer has the right to make an arrest, conduct a personal or property search, or obtain a warrant for arrest
(Multiple Choice)
4.8/5
(35)
Which of the following is not done when preparing for a case?
(Multiple Choice)
4.9/5
(34)
At a scene, technical advisors can help direct other investigators to collect evidence correctly. List the responsibilities of technical advisors.
(Essay)
4.8/5
(44)
An emergency situation under the PATRIOT Act is defined as the immediate risk of death or personal injury, such as finding a bomb threat in an e-mail.
(True/False)
4.9/5
(38)
To investigate employees suspected of improper use of company digital assets, a company policy statement about misuse of digital assets allows corporate investigators to conduct covert surveillance with little or no cause, and access company computer systems and digital devices without a warrant.
(True/False)
4.9/5
(35)
What should you do while copying data on a suspect's computer that is still live?
(Multiple Choice)
4.8/5
(42)
To verify data integrity, different methods of obtaining a unique identity for file data have been developed. Explain how you can use Cyclic Redundancy Check (CRC) and Message Digest 5 (MD5) for this purpose.
(Essay)
4.8/5
(40)
The term _______ describes rooms filled with extremely large disk systems that are typically used by large business data centers.
(Multiple Choice)
4.8/5
(34)
Match the terms with the correct definitions?.
-?An algorithm that produces a hexadecimal value of a file or storage media; used to determine whether data has changed
(Multiple Choice)
4.8/5
(34)
________________ can be any information stored or transmitted in digital form.
(Short Answer)
4.9/5
(39)
After you record the scene and shut down the system, you bag and tag the evidence. Describe the steps to follow for bagging and tagging evidence.?
(Essay)
4.8/5
(45)
Consistent practices help verify your work and enhance your credibility, so you must handle all evidence consistently. Explain why it's important to apply the same security and accountability controls for evidence in a civil lawsuit as in a major crime.
(Essay)
5.0/5
(33)
Match the terms with the correct definitions?.
-A mathematic algorithm that translates a file into a unique hexadecimal value
(Multiple Choice)
4.9/5
(37)
Match the terms with the correct definitions?.
-?A portable kit designed to process several computers and a variety of operating systems at a crime or incident scene involving computers
(Multiple Choice)
4.8/5
(28)
Match the terms with the correct definitions?.
-Detecting data transmissions to and from a suspect's computer? and a network server to determine the type of data being transmitted over a network
(Multiple Choice)
4.8/5
(47)
The Fourth Amendment states that only warrants "particularly describing the place to be searched and the persons or things to be seized" can be issued. The courts have determined that this phrase means a warrant can authorize a search of a specific place for anything.
(True/False)
4.8/5
(36)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)