Deck 2: Language of Computer Crime Investigation
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/33
Play
Full screen (f)
Deck 2: Language of Computer Crime Investigation
1
Stolen bank account information is an example of:
A) Hardware as contraband or fruits of crime
B) Information as contraband or fruits of crime
C) Information as an instrumentality
D) Information as evidence
A) Hardware as contraband or fruits of crime
B) Information as contraband or fruits of crime
C) Information as an instrumentality
D) Information as evidence
B
2
A network sniffer program is an example of:
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Information as an instrumentality
D) Information as evidence
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Information as an instrumentality
D) Information as evidence
C
3
The first US law to address computer crime was:
A) Computer Fraud and Abuse Act (CFAA)
B) Florida Computer Crime Act
C) Computer Abuse Act
D) None of the above
A) Computer Fraud and Abuse Act (CFAA)
B) Florida Computer Crime Act
C) Computer Abuse Act
D) None of the above
B
4
Computers can play the following roles in a crime:
A) Target, object, and subject
B) Evidence, instrumentality, contraband, or fruit of crime
C) Object, evidence, and tool
D) Symbol, instrumentality, and source of evidence
A) Target, object, and subject
B) Evidence, instrumentality, contraband, or fruit of crime
C) Object, evidence, and tool
D) Symbol, instrumentality, and source of evidence
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
5
A printer used for counterfeiting is an example of:
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Hardware as evidence
D) Information as contraband or fruits of crime
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Hardware as evidence
D) Information as contraband or fruits of crime
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
6
A cloned mobile telephone is an example of:
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Information as contraband or fruits of crime
D) Information as evidence
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Information as contraband or fruits of crime
D) Information as evidence
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
7
A network can be an instrumentality of a crime.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
8
A single crime can fall into more than one of the following categories: hardware or information as evidence, instrumentality, and contraband or fruits of crime.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
9
The first tool for making forensic copies of computer storage media was:
A) EnCase
B) Expert Witness
C) dd
D) Safeback
A) EnCase
B) Expert Witness
C) dd
D) Safeback
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
10
The following specializations exist in digital investigations:
A) First responder (a.k.a. digital crime scene technician)
B) Forensic examiner
C) Digital investigator
D) All of the above
A) First responder (a.k.a. digital crime scene technician)
B) Forensic examiner
C) Digital investigator
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
11
One of the most common approaches to validating forensic software is to:
A) Examine the source code
B) Ask others if the software is reliable
C) Compare results of multiple tools for discrepancies
D) Computer forensic tool testing projects
A) Examine the source code
B) Ask others if the software is reliable
C) Compare results of multiple tools for discrepancies
D) Computer forensic tool testing projects
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
12
Phone company records are an example of:
A) Hardware as contraband or fruits of crime
B) Information as contraband or fruits of crime
C) Information as an instrumentality
D) Information as evidence
A) Hardware as contraband or fruits of crime
B) Information as contraband or fruits of crime
C) Information as an instrumentality
D) Information as evidence
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
13
In the course of conducting forensic analysis, which of the following actions are carried out?
A) Critical thinking
B) Fusion
C) Validation
D) All of the above
A) Critical thinking
B) Fusion
C) Validation
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
14
The American Society of Crime Laboratory Directors (ASCLD) is the only group to establish guidelines for how digital evidence is handled in crime labs.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
15
Contraband can include:
A) Child pornography
B) Devices or programs for eavesdropping on communications
C) Encryption devices or applications
D) All of the above
A) Child pornography
B) Devices or programs for eavesdropping on communications
C) Encryption devices or applications
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
16
Computer equipment purchased with stolen credit card information is an example of:
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Hardware as evidence
D) Information as contraband or fruits of crime
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Hardware as evidence
D) Information as contraband or fruits of crime
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
17
An instrumentality of a crime is:
A) An instrument used to commit a crime
B) A weapon or tool designed to commit a crime
C) Anything that plays a significant role in a crime
D) All of the above
A) An instrument used to commit a crime
B) A weapon or tool designed to commit a crime
C) Anything that plays a significant role in a crime
D) All of the above
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
18
Digital photographs or videos of child exploitation is an example of:
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Hardware as evidence
D) Information as contraband or fruits of crime
A) Hardware as contraband or fruits of crime
B) Hardware as an instrumentality
C) Hardware as evidence
D) Information as contraband or fruits of crime
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
19
There is a general agreement as to the meaning of the term "computer crime."
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
20
The NIST Computer Forensic Tool Testing Project has identified all bugs in all forensic hardware and software.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
21
The US Computer Assistance Law Enforcement Act (CALEA) that took effect in 2000 compels telephone companies to keep detailed records of their customers' calls for up to three years.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
22
What term do you think best describes this field (e.g., computer forensics, forensic computing, digital forensics) and why?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
23
Network sniffer software is illegal to possess, and therefore is considered contraband.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
24
When a computer is used to forge documents or break into other computers, it is the subject of the crime.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
25
When a computer contains only a few pieces of digital evidence, investigators are authorized to collect the entire computer.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
26
What roles can computers play in a crime? Give an example of each role.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
27
A computer can be considered instrumentality because it contained a file that detailed the growing characteristics of marijuana plants.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
28
A flatbed scanner used to digitize child pornography can be considered in both the hardware as instrumentality and hardware as evidence categories.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
29
The terms "forensic examination" and "forensic analysis" are the same, and can be used interchangeably.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
30
The distinction between a computer as the object and subject of a crime is useful from an investigative standpoint because it relates to the intent of the offender.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
31
Discuss the benefits and shortcomings of creating specializations of crime scene experts, evidence examiners, and investigators. What are the advantages and disadvantages for requiring individuals in each specialization to pass a standard competency test?
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
32
Contraband is property that the private citizen is not permitted to possess.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck
33
The main reason for seizing contraband or fruits of crime is to prevent and deter future crimes.
Unlock Deck
Unlock for access to all 33 flashcards in this deck.
Unlock Deck
k this deck